rfc9138xml2.original.xml   rfc9138.xml 
<?xml version="1.0" encoding="US-ASCII"?> <?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [ <!DOCTYPE rfc [
<!ENTITY rfc1498 PUBLIC "" "http://xml.resource.org/public/rfc/bibxml/referenc <!ENTITY nbsp "&#160;">
e.RFC.1498.xml"> <!ENTITY zwsp "&#8203;">
<!ENTITY rfc2119 PUBLIC "" "http://xml.resource.org/public/rfc/bibxml/reference. <!ENTITY nbhy "&#8209;">
RFC.2119.xml"> <!ENTITY wj "&#8288;">
<!ENTITY rfc2460 PUBLIC "" "http://xml.resource.org/public/rfc/bibxml/reference.
RFC.2460.xml">
<!ENTITY rfc4919 PUBLIC "" "http://xml.resource.org/public/rfc/bibxml/reference.
RFC.4919.xml">
<!ENTITY rfc4944 PUBLIC "" "http://xml.resource.org/public/rfc/bibxml/reference.
RFC.4944.xml">
<!ENTITY rfc5826 PUBLIC "" "http://xml.resource.org/public/rfc/bibxml/reference.
RFC.5826.xml">
<!ENTITY rfc6282 PUBLIC "" "http://xml.resource.org/public/rfc/bibxml/reference.
RFC.6282.xml">
<!ENTITY rfc6568 PUBLIC "" "http://xml.resource.org/public/rfc/bibxml/reference.
RFC.6568.xml">
<!ENTITY rfc6775 PUBLIC "" "http://xml.resource.org/public/rfc/bibxml/referenc
e.RFC.6775.xml">
<!ENTITY rfc6830 PUBLIC "" "http://xml.resource.org/public/rfc/bibxml/referenc
e.RFC.6830.xml">
<!ENTITY rfc6833 PUBLIC "" "http://xml.resource.org/public/rfc/bibxml/referenc
e.RFC.6833.xml">
<!ENTITY rfc7252 PUBLIC "" "http://xml.resource.org/public/rfc/bibxml/referenc
e.RFC.7252.xml">
<!ENTITY rfc7228 PUBLIC "" "http://xml.resource.org/public/rfc/bibxml/reference.
RFC.7228.xml">
<!ENTITY rfc7428 PUBLIC "" "http://xml.resource.org/public/rfc/bibxml/reference.
RFC.7428.xml">
<!ENTITY rfc7668 PUBLIC "" "http://xml.resource.org/public/rfc/bibxml/reference.
RFC.7668.xml">
<!ENTITY rfc7927 PUBLIC "" "http://xml.resource.org/public/rfc/bibxml/reference.
RFC.7927.xml">
]> ]>
<rfc category="info" docName="draft-irtf-icnrg-nrs-requirements-06" ipr="trust20 <rfc xmlns:xi="http://www.w3.org/2001/XInclude" docName="draft-irtf-icnrg-nrs-re
0902"> quirements-06" number="9138" ipr="trust200902" obsoletes="" updates="" submissio
nType="IRTF" category="info" consensus="true" xml:lang="en" tocInclude="true" to
<?xml-stylesheet type='text/xsl' href='rfc2629.xslt' ?> cDepth="4" symRefs="true" sortRefs="true" version="3">
<!-- used by XSLT processors -->
<!-- For a complete list and description of processing instructions (PIs),
please see http://xml.resource.org/authoring/README.html. -->
<!-- Below are generally applicable Processing Instructions (PIs) that most I-
Ds might want to use.
(Here they are set differently than their defaults in xml2rfc v1.32) -->
<?rfc strict="yes" ?>
<!-- give errors regarding ID-nits and DTD validation -->
<!-- control the table of contents (ToC) -->
<?rfc toc="yes"?>
<!-- generate a ToC -->
<?rfc tocdepth="4"?>
<!-- the number of levels of subsections in ToC. default: 3 -->
<!-- control references -->
<?rfc symrefs="yes"?>
<!-- use symbolic references tags, i.e, [RFC2119] instead of [1] -->
<?rfc sortrefs="no" ?>
<!-- sort the reference entries alphabetically -->
<!-- control vertical white space
(using these PIs as follows is recommended by the RFC Editor) -->
<?rfc compact="no" ?>
<!-- do not start each<ul><li></li></ul><ul><li></li></ul> main section on a n
ew page -->
<?rfc subcompact="no" ?>
<!-- keep one blank line between list items -->
<!-- end of list of popular I-D processing instructions -->
<!-- ***** FRONT MATTER ***** --> <!-- xml2rfc v2v3 conversion 3.9.1 -->
<front> <front>
<!-- The abbreviated title is used in the page header - it is only necessa <title abbrev="Design Considerations for NRS">Design Considerations for Name
ry if the Resolution Service in Information-Centric Networking (ICN)</title>
full title is longer than 39 characters --> <seriesInfo name="RFC" value="9138"/>
<title abbrev="Design Considerations for NRS">Design Considerations for Name
Resolution Service in ICN</title>
<!-- add 'role="editor"' below for the editors if appropriate -->
<!-- Another author who claims to be an editor -->
<author fullname="Jungha Hong" initials="J." surname="Hong"> <author fullname="Jungha Hong" initials="J." surname="Hong">
<organization>ETRI</organization> <organization>ETRI</organization>
<address>
<address> <postal>
<postal> <extaddr>Yuseung-Gu</extaddr>
<street>218 Gajeong-ro, Yuseung-Gu</street> <street>218 Gajeong-ro</street>
<!-- Reorder these if your country does things differently --> <city>Daejeon</city>
<city>Daejeon</city> <code>34129</code>
<region></region> <country>Republic of Korea</country>
<code>34129</code> </postal>
<country>Korea</country> <email>jhong@etri.re.kr</email>
</postal>
<phone></phone>
<email>jhong@etri.re.kr</email>
<!-- uri and facsimile elements may also be added -->
</address> </address>
</author> </author>
<author fullname="Tae-Wan You" initials="T." surname="You"> <author fullname="Tae-Wan You" initials="T." surname="You">
<organization>ETRI</organization> <organization>ETRI</organization>
<address>
<address> <postal>
<postal> <extaddr>Yuseung-Gu</extaddr>
<street>218 Gajeong-ro, Yuseung-Gu</street> <street>218 Gajeong-ro</street>
<!-- Reorder these if your country does things differently --> <city>Daejeon</city>
<city>Daejeon</city> <code>34129</code>
<region></region> <country>Republic of Korea</country>
<code>34129</code> </postal>
<country>Korea</country> <email>twyou@etri.re.kr</email>
</postal>
<phone></phone>
<email>twyou@etri.re.kr</email>
<!-- uri and facsimile elements may also be added -->
</address> </address>
</author> </author>
<author fullname="Lijun Dong" initials="L." surname="Dong"> <author fullname="Lijun Dong" initials="L." surname="Dong">
<organization>Futurewei Technologies Inc.</organization> <organization>Futurewei Technologies Inc.</organization>
<address>
<address> <postal>
<postal> <street>10180 Telesis Court</street>
<street>10180 Telesis Court</street> <city>San Diego</city>
<!-- Reorder these if your country does things differently --> <region>CA</region>
<city>San Diego</city> <code>92121</code>
<region>CA</region> <country>United States of America</country>
<code>92121</code> </postal>
<country>USA</country> <email>lijun.dong@futurewei.com</email>
</postal>
<phone></phone>
<email>lijun.dong@futurewei.com</email>
<!-- uri and facsimile elements may also be added -->
</address> </address>
</author> </author>
<author fullname="Cedric Westphal" initials="C." surname="Westphal">
<author fullname="Cedric Westphal" initials="C." surname="Westphal"> <organization>Futurewei Technologies Inc.</organization>
<organization>Futurewei Technologies Inc.</organization> <address>
<postal>
<address> <street>2330 Central Expressway</street>
<postal> <city>Santa Clara</city>
<street>2330 Central Expressway</street> <region>CA</region>
<!-- Reorder these if your country does things differently --> <code>95050</code>
<city>Santa Clara</city> <country>United States of America</country>
<region>CA</region> </postal>
<code>95050</code> <email>cedric.westphal@futurewei.com</email>
<country>USA</country>
</postal>
<phone></phone>
<email>cedric.westphal@futurewei.com</email>
<!-- uri and facsimile elements may also be added -->
</address> </address>
</author> </author>
<author fullname="Börje Ohlman" initials="B." surname="Ohlman">
<author fullname="Borje Ohlman" initials="B." surname="Ohlman"> <organization abbrev="Ericsson">Ericsson Research</organization>
<organization abbrev="Ericsson">Ericsson Research</organization> <address>
<postal>
<address> <city>Stockholm</city>
<postal> <code>16480</code>
<street>S-16480 Stockholm</street> <country>Sweden</country>
<!-- Reorder these if your country does things differently --> </postal>
<city></city> <email>Borje.Ohlman@ericsson.com</email>
<region></region>
<code></code>
<country>Sweden</country>
</postal>
<phone></phone>
<email>Borje.Ohlman@ericsson.com</email>
<!-- uri and facsimile elements may also be added -->
</address> </address>
</author> </author>
<date month="November" year="2021"/>
<date day="28" month="July" year="2021" />
<!-- If the month and year are both specified and are the current ones, xml2
rfc will fill
in the current day for you. If only the current year is specified, xml2rfc
will fill
in the current day and month for you. If the year is not the current one
, it is
necessary to specify at least a month (xml2rfc assumes day="1" if not sp
ecified for the
purpose of calculating the expiry date). With drafts it is normally suf
ficient to
specify just the year. -->
<!-- Meta-data Declarations -->
<area>ICNRG</area> <area>ICNRG</area>
<workgroup>Information-Centric Networking</workgroup>
<workgroup>ICN Research Group</workgroup>
<!-- WG name at the upperleft corner of the doc,
IETF is fine for individual submissions.
If this element is not present, the default is "Network Working Group",
which is used by the RFC Editor as a nod to the history of the IETF. -->
<keyword>Internet Draft</keyword>
<!-- Keywords will be incorporated into HTML output
files in a meta tag but they have no effect on text or nroff
output. If you submit your draft to the RFC Editor, the
keywords will be used for the search engine. -->
<abstract> <abstract>
<t> <t>
This document provides the functionalities and design considerations This document provides the functionalities and design considerations
for a Name Resolution Service (NRS) in ICN. An NRS in ICN is to transla for a Name Resolution Service (NRS) in Information-Centric Networking (I
te CN).
The purpose of an NRS in ICN is to translate
an object name into some other information such as a locator, another an object name into some other information such as a locator, another
name, etc. for forwarding the object request. This document is a product name, etc. in order to forward the object request. This document is a pr oduct
of the Information-Centric Networking Research Group (ICNRG). of the Information-Centric Networking Research Group (ICNRG).
</t> </t>
</abstract> </abstract>
</front>
</front>
<middle> <middle>
<section numbered="true" toc="default">
<section title="Introduction"> <name>Introduction</name>
<t>
<t>
The current Internet is based upon a host-centric networking paradigm, where hosts are The current Internet is based upon a host-centric networking paradigm, where hosts are
identified with IP addresses and communication is possible identified with IP addresses and communication is possible
between any pair of hosts. Thus, information in the current Internet between any pair of hosts. Thus, information in the current Internet
is identified by the name of the host (or server) where information is stored. is identified by the name of the host (or server) where the informatio n is stored.
In contrast to host-centric networking, the primary communication In contrast to host-centric networking, the primary communication
objects in Information-centric networking (ICN) are the named data objects in Information-Centric Networking (ICN) are the named data
objects (NDOs) and they are uniquely identified by location-independen objects (NDOs), and they are uniquely identified by location-independe
t nt
names. Thus, ICN aims for the efficient dissemination and retrieval of names. Thus, ICN aims for the efficient dissemination and retrieval of
NDOs at a global scale, and has been identified and acknowledged as a NDOs at a global scale and has been identified and acknowledged as a
promising technology for a future Internet architecture to overcome promising technology for a future Internet architecture to overcome
the limitations of the current Internet such as scalability and the limitations of the current Internet, such as scalability and
mobility <xref target="Ahlgren"></xref> <xref target="Xylomenos"></xre mobility <xref target="Ahlgren" format="default"/> <xref target="Xylom
f>. enos" format="default"/>.
ICN also has emerged as a candidate architecture in the IoT environmen ICN also has emerged as a candidate architecture in the Internet of Th
t ings (IoT) environment
since IoT focuses on data and information since IoT focuses on data and information
<xref target="Baccelli"></xref> <xref target="Amadeo"></xref> <xref ta <xref target="Baccelli" format="default"/> <xref target="Amadeo" forma
rget="Quevedo"></xref> t="default"/> <xref target="Quevedo" format="default"/>
<xref target="Amadeo2"></xref> <xref target="ID.Zhang2"></xref>. <xref target="Amadeo2" format="default"/> <xref target="I-D.irtf-icnrg-i
</t> cniot" format="default"/>.
</t>
<t>Since naming data independently from its current location (where it i <t>Since naming data independently from its current location (where it is
s
stored) is a primary concept of ICN, how to find any NDO using a stored) is a primary concept of ICN, how to find any NDO using a
location-independent name is one of the most important design challeng es location-independent name is one of the most important design challeng es
in ICN. Such ICN routing may comprise three steps <xref target="RFC792 in ICN. Such ICN routing may comprise three steps <xref target="RFC792
7"></xref>: 7" format="default"/>:
</t> </t>
<t>
<list style="symbols">
<t>Name resolutio
n: matches/translates a content name to the locator
of content producer or source that can provide the content. </
t>
<t>Content reques
t routing: routes the content request towards
the content's location either based on its name or locator. </
t>
<t>Content delive
ry: transfers the content to the requester. </t>
</list>
</t>
<t> <ol type="(%d)" spacing="normal">
<li>Name resolution: matches/translates a content name to the locator
of the content producer or source that can provide the content
. </li>
<li>Content request routing: routes the content request towards
the content's location based either on its name or locator. </
li>
<li>Content delivery: transfers the content to the requester. </li>
</ol>
<t>
Among the three steps of ICN routing, this document investigates only Among the three steps of ICN routing, this document investigates only
the name resolution step which translates a content name to the conten t locator. the name resolution step, which translates a content name to the conte nt locator.
In addition, this document covers various possible types of name In addition, this document covers various possible types of name
resolution in ICN such as one name to another name, name to locator, resolution in ICN such as one name to another name, name to locator,
name to manifest, name to metadata, etc. name to manifest, name to metadata, etc.
</t> </t>
<t>
<t>
The focus of this document is a Name Resolution Service (NRS) itself The focus of this document is a Name Resolution Service (NRS) itself
as a service or a system in ICN and it provides the functionalities an d as a service or a system in ICN, and it provides the functionalities a nd
the design considerations for an NRS in ICN as well as the overview of the design considerations for an NRS in ICN as well as the overview of
the NRS approaches in ICN. On the other hand, its companion document the NRS approaches in ICN. On the other hand, its companion document
<xref target="NRSarch"></xref> describes considerations from the persp <xref target="I-D.irtf-icnrg-nrsarch-considerations" format="default"/
ective > describes considerations from the perspective
of ICN architecture and routing system when using an NRS in ICN. of the ICN architecture and routing system when using an NRS in ICN.
</t> </t>
<t>
<t>
This document represents the consensus of the Information-Centric This document represents the consensus of the Information-Centric
Networking Research Group (ICNRG). It has been reviewed extensively Networking Research Group (ICNRG). It has been reviewed extensively
by the Research Group (RG) members who are actively involved in the by the Research Group (RG) members who are actively involved in the
research and development of the technology covered by this document. research and development of the technology covered by this document.
It is not an IETF product and is not a standard. It is not an IETF product and is not a standard.
</t> </t>
</section>
<!--
<section title="Conventions and Terminology">
<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SH
OULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are t
o be interpreted as described in <xref target="RFC2119"></xref>.</t>
</section> </section>
<section title="Name Resolution Service in ICN"> <section numbered="true" toc="default">
<name>Name Resolution Service in ICN</name>
<t> <t>
A Name Resolution Service (NRS) in ICN is defined as the service that A Name Resolution Service (NRS) in ICN is defined as the service that
provides the name resolution function for translating an object name provides the name resolution function for translating an object name
into some other information such as a locator, another name, metadata, into some other information such as a locator, another name, metadata,
next hop info, etc. that is used for forwarding the object request. next-hop info, etc. that is used for forwarding the object request.
In other words, an NRS is a service that can be provided by the ICN In other words, an NRS is a service that can be provided by the ICN
infrastructure to help a consumer to reach a specific piece of informa tion infrastructure to help a consumer reach a specific piece of informatio n
(or named data object). The consumer provides an NRS with a persistent (or named data object). The consumer provides an NRS with a persistent
name and the NRS returns a name or locator (or potentially multiple name, and the NRS returns a name or locator (or potentially multiple
names and locators) that can reach a current instance of the names and locators) that can reach a current instance of the
requested object. requested object.
</t> </t>
<t>
<t> The name resolution is a necessary process in ICN routing, although the
The name resolution is a necessary process in ICN routing although the
name resolution either can be separated from the content request routin g name resolution either can be separated from the content request routin g
as an explicit process or can be integrated with the content request as an explicit process or can be integrated with the content request
routing as an implicit process. The former is referred as explicit nam routing as an implicit process. The former is referred to as an "expli
e cit name
resolution approach, the latter is referred as name-based routing appro resolution approach", and the latter is referred to as a "name-based ro
ach uting approach"
in this document. in this document.
</t> </t>
<section numbered="true" toc="default">
<section title="Explicit name resolution approach"> <name>Explicit Name Resolution Approach</name>
<t>
<t>
An NRS could take the explicit name resolution approach to return the An NRS could take the explicit name resolution approach to return the
locators of the content to the client, which will be used by the under lying locators of the content to the client, which will be used by the under lying
network as the identifier to route the client's request to one of the network as the identifier to route the client's request to one of the
producers or to a copy of the content. There are several ICN projects producers or to a copy of the content. There are several ICN projects
that use the explicit name resolution approach such as DONA that use the explicit name resolution approach, such as Data-Oriented
<xref target="Koponen"></xref>, PURSUIT <xref target="PURSUIT"></xref> Network Architecture (DONA) <xref target="Koponen" format="default"/>, PURSUIT
, <xref target="PURSUIT" format="default"/>,
NetInf <xref target="SAIL"></xref>, MobilityFirst <xref target="MF"></ Network of Information (NetInf) <xref target="SAIL" format="default"/>
xref>, , MobilityFirst <xref target="MF" format="default"/>,
IDNet <xref target="Jung"></xref>, etc. In addition, the explicit name IDNet <xref target="Jung" format="default"/>, etc. In addition, the ex
resolution approach has been allowed for 5G control planes <xref targe plicit name
t="SA2-5GLAN"></xref>. resolution approach has been allowed for 5G control planes <xref targe
</t> t="SA2-5GLAN" format="default"/>.
</t>
</section> </section>
<section numbered="true" toc="default">
<section title="Name-based routing approach"> <name>Name-Based Routing Approach</name>
<t>An NRS could take the name-based routing approach, which integrates
<t>An NRS could take the name-based routi name resolution with content request message routing as in
ng approach, which integrates Named Data Networking / Content-Centric Networking (NDN/CCNx) <xref
the name resolution with the content request message routing as in target="NDN" format="default"/> <xref target="CCNx" format="default"/>.
NDN <xref target="NDN"></xref>/CCNx <xref target="CCNx"></xref>. </t>
</t> <t>
In cases where the content request also specifies the reverse path,
<t>
In the case that the content request also specifies the reverse path
,
as in NDN/CCNx, the name resolution mechanism also derives the routi ng as in NDN/CCNx, the name resolution mechanism also derives the routi ng
path for the data. This adds a requirement on the name resolution path for the data. This adds a requirement to the name resolution
service to propagate request in a way that is consistent with the service to propagate the request in a way that is consistent with th
e
subsequent data forwarding. Namely, the request must select a path subsequent data forwarding. Namely, the request must select a path
for the data based upon finding a copy of the content, but also for the data based upon finding a copy of the content but also
properly delivering the data. properly delivering the data.
</t> </t>
</section>
</section> <section numbered="true" toc="default">
<name>Hybrid Approach</name>
<section title="Hybrid approach"> <t>
<t>
An NRS could also take hybrid approach. For instance, it can attempt An NRS could also take hybrid approach. For instance, it can attempt
the name-based routing approach first. If this fails at a certain the name-based routing approach first. If this fails at a certain
router, the router can go back to the explicit name resolution appro ach. router, the router can go back to the explicit name resolution appro ach.
The hybrid NRS approach also works the other way around by performin The hybrid NRS approach also works the other way around: first by pe
g rforming
explicit name resolution first to find locators of routers. And then explicit name resolution to find the locators of routers, then by ro
it can carry out the name-based routing approach of the client's req uting the client's request using the name-based routing approach.
uest. </t>
</t> <t>
<t>
A hybrid approach would combine name resolution over a subset of A hybrid approach would combine name resolution over a subset of
routers on the path with some tunneling in between (say, across an routers on the path with some tunneling in between (say, across an
administrative domain) so that only a few of the nodes in the ICN administrative domain) so that only a few of the nodes in the ICN
network perform name resolution in the name-based routing approach. network perform name resolution in the name-based routing approach.
</t> </t>
</section>
</section> <section numbered="true" toc="default">
<name>Comparisons of Name Resolution Approaches</name>
<section title="Comparisons of name resolution approaches <t>
">
<t>
The following compares the explicit name resolution and the name-base d The following compares the explicit name resolution and the name-base d
routing approaches for several aspects: routing approaches in several aspects:
</t> </t>
<ul spacing="normal">
<t> <li>Overhead due to the maintenance of the content location:
<list style="symbols">
<t>Overhead due t
o the maintenance of the content location:
The content reachability is dynamic and includes new The content reachability is dynamic and includes new
content being cached or content being expired from a cache, content being cached or content being expired from a cache,
content producer mobility, etc. Maintaining a consistent content producer mobility, etc. Maintaining a consistent
view of the content location across the network requires view of the content location across the network requires
some overhead that differs for the name resolution approaches. some overhead that differs for the name resolution approaches.
The name-based routing approach may require flooding The name-based routing approach may require flooding
parts of the network for update propagation. In the worst parts of the network for update propagation. In the worst
case, the name-based routing approach may flood the whole netw ork case, the name-based routing approach may flood the whole netw ork
(but mitigating techniques may be used to scope the flooding). (but mitigating techniques may be used to scope the flooding).
However, the explicit name resolution approach only requires However, the explicit name resolution approach only requires
updating propagation in part of the name resolution system updating propagation in part of the name resolution system
(which could be an overlay with a limited number of nodes). </ (which could be an overlay with a limited number of nodes). </
t> li>
<t>Resolution cap <li>Resolution capability: The explicit name resolution approach, if d
ability: The explicit name resolution approach, if designed and deployed with su esigned and deployed with sufficient robustness, can offer at least weak guarant
fficient robustness, can offer at least weak guarantees that resolution will suc ees that resolution will succeed for any content name in the network if it is re
ceed for any content name in the network if it is registered to the name resolut gistered to the name resolution overlay.
ion overlay. In the name-based routing approach, content resolution depends
In the name-based routing approach, content resolution depends on the flooding scope of the content names (i.e., content publishing message an
on the flooding scope of the content names (i.e. content publishing message and d the resulting name-based routing tables).
the resulting name-based routing tables). For example, when content is cached, the router may only notif
For example, when a content is cached, the router may only not y its direct neighbors of this information. Thus, only those neighboring
ify this information to its direct neighbors. Thus, only those neighboring route routers can build a name-based entry for this cached content.
rs can build a named based entry for this cached content. But if the neighboring routers continue to propagate this info
But if the neighboring routers continue to propagate this info rmation, the other nodes are able to direct to this cached copy as well. </li>
rmation, the other nodes are able to direct to this cached copy as well. </t>
<t>Node failure i
mpact: Nodes involved in the explicit name resolution approach are the name reso
lution overlay servers (e.g. Resolution Handlers in DONA),
while the nodes involved in the name-based routing approach ar
e routers which route messages based on the name-based routing tables (e.g. NDN
routers).
Node failures in the explicit name resolution approach may cau
se some content request routing to fail even though the content is available.
This problem does not exist in the name-based routing approach
because other alternative paths can be discovered to bypass the failed ICN rout
ers, given the assumption that the network is still connected.</t>
<t>Maintained dat
abases: The storage usage for the explicit name resolution approach is different
from that of the name-based routing approach.
The explicit name resolution approach typically needs to maint
ain two databases: name to locator mapping in the name resolution overlay and ro
uting tables in the routers on the data forwarding plane.
The name-based routing approach needs to maintain only the na
me-based routing tables.</t>
</list>
</t>
<t>Additionally, some other intermediary step may be included in the nam
e resolution, namely the mapping of one name to other names, in order to facilit
ate the retrieval of named content, by way of a manifest <xref target="Westphal"
></xref> <xref target="Mosko"></xref>.
The manifest is resolved using one of the two above approaches, and it m
ay include further mapping of names to content and location. The steps for name
resolution then become: first translate the manifest name into a location of a c
opy of the manifest; the manifest includes further names of the content componen
ts, and potentially locations for the content.
The content is then retrieved by using these names and/or location, pote
ntially resulting in additional name resolutions. </t>
<li>Node failure impact: Nodes involved in the explicit name resolutio
n approach are the name resolution overlay servers (e.g., resolution handlers in
DONA),
while the nodes involved in the name-based routing approach ar
e routers that route messages based on the name-based routing tables (e.g., NDN
routers).
Node failures in the explicit name resolution approach may cau
se some content request routing to fail even though the content is available.
This problem does not exist in the name-based routing approach
because other alternative paths can be discovered to bypass the failed ICN rout
ers, given the assumption that the network is still connected.</li>
<li>Maintained databases: The storage usage for the explicit name reso
lution approach is different from that of the name-based routing approach.
The explicit name resolution approach typically needs to maint
ain two databases: name-to-locator mapping in the name resolution overlay and ro
uting tables in the routers on the data forwarding plane.
The name-based routing approach needs to maintain only the na
me-based routing tables.</li>
</ul>
<t>Additionally, some other intermediary step may be included in the nam
e resolution -- namely, the mapping of one name to other names -- in order to fa
cilitate the retrieval of named content by way of a manifest <xref target="Westp
hal" format="default"/> <xref target="RFC8569" format="default"/>.
The manifest is resolved using one of the two above approaches, and it m
ay include further mapping of names to content and location.
The steps for name resolution then become the following: first, translate the ma
nifest name into a location of a copy of the manifest, which includes further na
mes of the content components and potentially locations for the content, then re
trieve the content by using these names and/or location, potentially resulting i
n additional name resolutions. </t>
<t>Thus, no matter which approach is taken by an NRS in ICN, the name re solution is the essential function that shall be provided by the ICN infrastruct ure. </t> <t>Thus, no matter which approach is taken by an NRS in ICN, the name re solution is the essential function that shall be provided by the ICN infrastruct ure. </t>
</section>
</section> </section>
<section numbered="true" toc="default">
</section> <name>Functionalities of NRS in ICN</name>
<t>This section presents the functionalities of an NRS in ICN. </t>
<section title="Functionalities of NRS in ICN"> <section numbered="true" toc="default">
<t>This section presents the functionalities of an NRS in ICN. </t> <name>Support Heterogeneous Name Types</name>
<t>
<section title="Support heterogeneous name types"> In ICN, a name is used to identify the data object and is bound to it
<t> <xref target="RFC7927" format="default"/>.
In ICN, a name is used to identify data object and is bound to it <xre ICN requires uniqueness and persistency of the name of the data object
f target="RFC7927"></xref>. to ensure the
ICN requires uniqueness and persistency of the name of data object to
ensure the
reachability of the object within a certain scope. There are reachability of the object within a certain scope. There are
heterogeneous approaches to designing ICN naming schemes <xref target= "Bari"></xref>. heterogeneous approaches to designing ICN naming schemes <xref target= "Bari" format="default"/>.
Ideally, a name can include any form of identifier, which can be Ideally, a name can include any form of identifier, which can be
flat or hierarchical, and human readable or non-readable. flat or hierarchical, human readable or non-readable.
</t> </t>
<t> <t>
Although there are diverse types of naming schemes proposed in literat Although there are diverse types of naming schemes proposed in the lit
ure, erature,
they all need to provide basic functions for identifying data object, they all need to provide basic functions for identifying a data object
supporting named data lookup and routing. An NRS may combine the bette ,
r supporting named data lookup, and routing. An NRS may combine the bett
er
aspects of different schemes. Basically, an NRS should be able to supp ort aspects of different schemes. Basically, an NRS should be able to supp ort
a generic naming schema so that it can resolve any type of content nam e, a generic naming schema so that it can resolve any type of content nam e,
irrespective of whether it is flat, hierarchical, attribute-based or irrespective of whether it is flat, hierarchical, attribute based, or
anything else. anything else.
</t> </t>
<t> <t>
In PURSUIT <xref target="PURSUIT"></xref>, names are flat and the rend In PURSUIT <xref target="PURSUIT" format="default"/>, names are flat,
ezvous and the rendezvous
functions are defined for an NRS, which is implemented by a set of Ren functions are defined for an NRS, which is implemented by a set of ren
dezvous dezvous
Nodes (RNs), the Rendezvous Network (RENE). Thus, a name consists of a nodes (RNs), known as the rendezvous network (RENE). Thus, a name cons
sequence of scope IDs and a single rendezvous ID is routed by the RNs ists of a
in RENE. sequence of scope IDs, and a single rendezvous ID is routed by the RNs
in RENE.
Thus, PURSUIT decouples name resolution and data routing, where the NR S Thus, PURSUIT decouples name resolution and data routing, where the NR S
is performed by the RENE. is performed by the RENE.
</t> </t>
<t> <t>
In MobilityFirst <xref target="MF"></xref>, a name called a Global In MobilityFirst <xref target="MF" format="default"/>, a name known as
Unique IDentifier (GUID) derived from a human-readable name via a glob a "Global
al Unique Identifier (GUID)", derived from a human-readable name via a gl
naming service is a flat typed 160-bits string with self-certifying obal
naming service, is a flat typed 160-bit string with self-certifying
properties. Thus, MobilityFirst defines a Global Name Resolution Servi ce properties. Thus, MobilityFirst defines a Global Name Resolution Servi ce
(GNRS) which resolves GUIDs to network addresses and decouples name (GNRS), which resolves GUIDs to network addresses and decouples name
resolution and data routing similarly to PURSUIT. resolution and data routing similarly to PURSUIT.
</t> </t>
<t> <t>
In NetInf <xref target="Dannewitz"></xref>, information objects are na In NetInf <xref target="Dannewitz" format="default"/>, information obj
med using ni-naming <xref target="RFC6920"></xref>, which consist of an authorit ects are named using Named Information (NI) names <xref target="RFC6920" format=
y part and digest part (content hash). "default"/>, which consist of an authority part and digest part (content hash).
The ni names can be flat as the authority part is optional. Thus, the The NI names can be flat as the authority part is optional. Thus, the
NetInf architecture also includes a Name Resolution System (NRS) which can be us NetInf architecture also includes a Name Resolution System (NRS), which can be u
ed to resolve ni-names to addresses in an underlying routable network layer. sed to resolve NI names to addresses in an underlying routable network layer.
</t> </t>
<t> <t>
In NDN <xref target="NDN"></xref> and CCNx <xref target="CCNx"></xref> , In NDN <xref target="NDN" format="default"/> and CCNx <xref target="CC Nx" format="default"/>,
names are hierarchical and may be similar to URLs. Each name component names are hierarchical and may be similar to URLs. Each name component
can be anything, including a human-readable string or a hash value. can be anything, including a human-readable string or a hash value.
NDN/CCNx adopts the name-based routing approach. The NDN router forwar ds NDN/CCNx adopts the name-based routing approach. The NDN router forwar ds
the request by doing the longest-match lookup in the Forwarding the request by doing the longest-match lookup in the Forwarding
Information Base (FIB) based on the content name and the request is Information Base (FIB) based on the content name, and the request is
stored in the Pending Interest Table (PIT). stored in the Pending Interest Table (PIT).
</t> </t>
<!--
<t> In ICN design, a name is used to identify an entity, such as named
data content, a device, an application, a service. ICN requires uniqueness and p
ersistency of the name of any entity to ensure the reachability of the entity wi
thin certain scope and with proper authentication and trust guarantees. The name
does not change with the mobility and multi-home of the corresponding entity. A
client can always use this name to retrieve the content from network and verify
the binding of the content and the name. </t>
<t>Ideally, a name can include any form of identi
fier, which can be flat, hierarchical, and human readable or non-readable. </t>
<t>There are heterogeneous content naming schemes
<xref target="ID.Zhang"></xref> <xref target="RFC1498"></xref> and name resolut
ion approaches from different ICN architectures. For example: </t>
<t>
<list style="symbols">
<t>Names in DONA
<xref target="Koponen"></xref> consist of the cryptographic hash of the principa
l's public key P and a label L uniquely identifying the information with respect
to the principal. Name resolution in DONA is provided by specialized servers ca
lled Resolution Handlers (RHs). </t>
<t>Content in PUR
SUIT <xref target="PURSUIT"></xref> is identified by a combination of a scope ID
and a rendezvous ID. The scope ID represents the boundaries of a defined dissem
ination strategy for the content it contain. The rendezvous ID is the actual ide
ntity for a particular content. Name resolution in PURSUIT is handled by a colle
ction of Rendezvous Nodes (RNs), which are implemented as a hierarchical Dynamic
Hash Table (DHT)<xref target="Rajahalme"></xref> <xref target="Katsaros"></xref
>. </t>
<t>Names in NDN <
xref target="NDN"></xref> and CCN <xref target="CCN"></xref> are hierarchical an
d may be similar to URLs. Each name component can be anything, including a dotte
d human-readable string or a hash value. NDN/CCN adopts the name based routing.
The NDN router forwards the request by doing the longest-match lookup in the For
warding Information Base (FIB) based on the content name and the request is stor
ed in the Pending Interest Table (PIT). </t>
<t>In MobilityFir
st <xref target="MF"></xref>, every network entity, content has a Global Unique
Identifier (GUID). GUIDs are flat 160-bit strings with no semantic structure. Na
me Resolution in MobilityFirst is carried out via a Global Name Resolution Servi
ce (GNRS). </t>
</list>
</t>
<t>Although the existing naming schemes are diffe
rent, they all need to provide basic functions for identifying a content, suppor
ting trust provenance, content lookup and routing. The NRS may combine the advan
tages of different mechanisms. The NRS should be able to support a generic namin
g schema to resolve any type of content name, either it is flat or hierarchical.
</t>
</section> </section>
<section numbered="true" toc="default">
<section title="Support producer mobility"> <name>Support Producer Mobility</name>
<t>
<t> ICN inherently supports mobility by consumers. Namely, consumer or cl
ICN natively supports mobility management. Namely, consumer or client ient
mobility is handled by re-requesting the content in case the mobility mobility is handled by re-requesting the content in case the mobility
event (say, handover) occurred before receiving the corresponding event (say, handover) occurred before receiving the corresponding
content from the network. Since ICN can ensure that content reception content from the network. Since ICN can ensure that content reception
continues without any disruption in ICN applications, seamless mobili ty continues without any disruption in ICN applications, seamless mobili ty
from the consumer's point of view can be easily supported. from the consumer's point of view can be easily supported.
</t> </t>
<t>
<t>
However, producer mobility does not emerge naturally from the ICN However, producer mobility does not emerge naturally from the ICN
forwarding model as does consumer mobility. If a producer moves into forwarding model as does consumer mobility. If a producer moves into
a different network location or a different name domain, which is a different network location or a different name domain, which is
assigned by another authoritative publisher, it would be difficult fo r assigned by another authoritative publisher, it would be difficult fo r
the mobility management to update RIB and FIB entries in ICN routers the mobility management to update Routing Information Base (RIB) and FIB entries in ICN routers
with the new forwarding path in a very short time. Therefore, various with the new forwarding path in a very short time. Therefore, various
ICN architectures in the literature have proposed to adopt an NRS to ICN architectures in the literature have proposed adopting an NRS to
achieve the producer or publisher mobility, where the NRS can be achieve the producer or publisher mobility, where the NRS can be
implemented in different ways such as rendezvous points and/or overla y mapping systems. implemented in different ways such as rendezvous points and/or overla y mapping systems.
</t> </t>
<t>
<t> In NDN <xref target="Zhang2" format="default"/>, for producer mobilit
In NDN <xref target="Zhang2"></xref>, for producer mobility support, y support, rendezvous mechanisms have been proposed to build interest rendezvous
rendezvous mechanisms have been proposed to build interests rendezvou
s
(RV) with data generated by a mobile producer (MP). This can be (RV) with data generated by a mobile producer (MP). This can be
classified into two approaches: chase mobile producer; and rendezvous data. classified into two approaches: chase mobile producer and rendezvous data.
Regarding MP chasing, rendezvous acts as a mapping service that provi des Regarding MP chasing, rendezvous acts as a mapping service that provi des
the mapping from the name of the data produced by the MP to the name the mapping from the name of the data produced by the MP to the name
of the MP's current point of attachment (PoA). Alternatively, the RV of the MP's current point of attachment (PoA).
Alternatively, the RV
serves as a home agent as in IP mobility support, so the RV enables serves as a home agent as in IP mobility support, so the RV enables
consumer's interest message to tunnel towards the MP at the PoA. the consumer's Interest message to tunnel towards the MP at the PoA.
Regarding rendezvous data, the solution involves moving the data prod uced Regarding rendezvous data, the solution involves moving the data prod uced
by the MP to a data depot instead of forwarding interest messages. Th by the MP to a data depot instead of forwarding Interest messages.
us,
a consumer's interest message can be forwarded to stationary place as Thus,
called data rendezvous, so it would either return the data or fetch i a consumer's Interest message can be forwarded to stationary place ca
t lled a "data rendezvous", so it would either return the data or fetch it
using another mapping solution. Therefore, RV or other mapping functi ons using another mapping solution. Therefore, RV or other mapping functi ons
are in the role of an NRS in NDN. are in the role of an NRS in NDN.
</t> </t>
<t>
<t> In <xref target="I-D.ravi-icnrg-ccn-forwarding-label" format="default"
In <xref target="Ravindran"></xref>, forwarding-label (FL) object is />, the forwarding label (FL) object is
referred to enable identifier (ID) and locator (LID) namespaces to be used to enable identifier (ID) and locator (LID) namespaces to be
split in ICN. Generally, IDs are managed by applications, while locato rs split in ICN. Generally, IDs are managed by applications, while locato rs
are managed by a network administrator, so that IDs are mapping to are managed by a network administrator so that IDs are mapped to
heterogeneous name schemes and LIDs are mapping to the network domains heterogeneous name schemes and LIDs are mapped to the network domains
or or
to specific network elements. Thus, the proposed FL object acts as a l ocator to specific network elements. Thus, the proposed FL object acts as a l ocator
(LID) and provides the flexibility to forward Interest messages throug h (LID) and provides the flexibility to forward Interest messages throug h
mapping service between IDs and LIDs. Therefore, the mapping service i n a mapping service between IDs and LIDs. Therefore, the mapping service in
control plane infrastructure can be considered as an NRS in this draft . control plane infrastructure can be considered as an NRS in this draft .
</t> </t>
<t>
<t> In MobilityFirst <xref target="MF" format="default"/>, both consumer a
In MobilityFirst <xref target="MF"></xref>, both consumer and publishe nd publisher
r
mobility can be primarily handled by the global name resolution servic e mobility can be primarily handled by the global name resolution servic e
(GNRS) which resolves GUIDs to network addresses. Thus, the GNRS must (GNRS), which resolves GUIDs to network addresses. Thus, the GNRS mus
be updated for mobility support when a network attached object changes t
be updated for mobility support when a network-attached object changes
its point of attachment, which differs from NDN/CCNx. its point of attachment, which differs from NDN/CCNx.
</t> </t>
<t> <t>
In NetInf <xref target="Dannewitz"></xref>, mobility is handled by In NetInf <xref target="Dannewitz" format="default"/>, mobility is han dled by
an NRS in a very similar way to MobilityFirst. an NRS in a very similar way to MobilityFirst.
</t> </t>
<t>
<t> Besides the consumer and producer mobility, ICN also faces
Besides the consumer and producer mobility, ICN also has to face
challenges to support the other dynamic features such as multi-homing , challenges to support the other dynamic features such as multi-homing ,
migration, and replication of named resources such as content, device s, migration, and replication of named resources such as content, device s,
and services. Therefore, an NRS can help to support these dynamic fea tures. and services. Therefore, an NRS can help to support these dynamic fea tures.
</t> </t>
<!--
<t>In ICN literature, it is said that mobility can be achieved in fundam
ental feature of ICN. Especially, consumer or client mobility can be achieved by
requesting information again according to the basic procedure from different in
terfaces or through attachment point of the new network. Moreover, seamless mobi
lity service in ICN ensures that content reception continues without any disrupt
ion in ICN application, so in consumer point of view, seamless mobility can be e
asily supported. </t>
<t>However, producer or publisher mobility in ICN
is more complicated to be supported. If a producer moves into different authori
ty domain or network location, then the request for a content published by the m
oving puroducer with origin name would be hardly forwarded to the moving produce
r since the routing tables related in broad area should be updated according to
the producer movement. Therefore, various ICN literatures would adopt NRS to ach
ieve the producer or publisher mobility, where NRS can be implemented in differe
nt ways such as rendezvous mechanism, mapping, etc. </t>
<t>Besides mobility, ICN has challenge to support
the dynamism features like multi-homing, migration, and replication of named re
sources such as content, devices, services, etc. and NRS may help to support the
dynamism features. </t>
</section> </section>
<section numbered="true" toc="default">
<section title="Support scalable routing system"> <name>Support Scalable Routing System</name>
<t>
<t>
In ICN, the name of data objects is used for routing by either a name In ICN, the name of data objects is used for routing by either a name
resolution step or a routing table lookup. Thus, routing information resolution step or a routing table lookup. Thus, routing information
for each data object should be maintained in the routing base, such for each data object should be maintained in the routing base, such
as Routing Information Base (RIB) and Forwarding Information Base (FI B). as RIB and FIB.
Since the number of data objects would be very large, the size of Since the number of data objects would be very large, the size of
information bases would be significantly larger as well <xref target= information bases would be significantly larger as well <xref target=
"RFC7927"></xref>. "RFC7927" format="default"/>.
</t> </t>
<t>
<t> The hierarchical namespace used in CCNx <xref target="CCNx" format="d
The hierarchical namespace used in CCNx <xref target="CCNx"></xref> efault"/>
and NDN <xref target="NDN"></xref> architectures reduces the size of and NDN <xref target="NDN" format="default"/> architectures reduces t
he size of
these tables through name aggregation and improves the scalability of these tables through name aggregation and improves the scalability of
the routing system. A flat naming scheme, on the other hand, would the routing system. A flat naming scheme, on the other hand, would
aggravate the scalability problem of the routing system. aggravate the scalability problem of the routing system.
The non-aggregated name prefixes injected to the Default Route Free The non-aggregated name prefixes injected into the Default Route Free
Zone (DFZ) of ICN would create more serious scalability problem when Zone (DFZ) of ICN would create a more serious scalability problem whe
n
compared to the scalability issues of the IP routing system. compared to the scalability issues of the IP routing system.
Thus, an NRS may play an important role in the reduction of the routi ng Thus, an NRS may play an important role in the reduction of the routi ng
scalability problem regardless of the types of namespaces. scalability problem regardless of the types of namespaces.
</t> </t>
<t>
<t> In <xref target="Afanasyev" format="default"/>, in order to address t
In <xref target="Afanasyev"></xref>, in order to address the routing he routing
scalability problem in NDN's DFZ, a well-known concept of Map-and-En scalability problem in NDN's DFZ, a well-known concept called "map-an
cap d-encap" is applied to provide a simple and secure namespace mapping solution.
is applied to provide a simple and secure namespace mapping solution.
In the proposed map-and-encap design, data whose name prefixes do not In the proposed map-and-encap design, data whose name prefixes do not
exist in the DFZ forwarding table can be retrieved by a distributed exist in the DFZ forwarding table can be retrieved by a distributed
mapping system called NDNS, which maintains and lookups the mapping mapping system called NDNS, which maintains and looks up the mapping
information from a name to its globally routed prefixes, where NDNS i s information from a name to its globally routed prefixes, where NDNS i s
a kind of an NRS. a kind of an NRS.
</t> </t>
<!--
<t>In ICN, data objects must be identified by names regardless their lo
cation or container <xref target="RFC7927"></xref> and the names are divided int
o two types of schemes: hierarchical and flat namespaces. A hierarchical scheme
used in CCN and NDN architectures has a structure similar to current URIs, where
the hierarchy improves scalability of routing system. It is because the hierarc
hy enables aggregation of the name resulting in reducing the size of RIB or FIB
as similar to IP routing system. In a flat scheme, on the other hand, name routi
ng is not easy since names in a flat namespace cannot be aggregated anymore, whi
ch would cause more the scalability problem in routing system. In order to addre
ss such problem, a flat name can be resolved to some information which is routab
le through NRS. </t>
<t>In ICN, application names identifying contents are used directl
y for packet delivery, so ICN routers run a name-based routing protocol to build
name-based routing and forwarding tables. Regardless of name scheme, if non-agg
regated name prefixes are injected to the Default Route Free Zone (DFZ) of ICN,
then they would be driving the growth of the DFZ routing table size, which is th
e same as the scalability issue of IP routing. Thus a solution to keep the routi
ng table size under control is needed, which can be done by defining indirection
layer. </t>
</section> </section>
<section numbered="true" toc="default">
<section title="Support off-path caching"> <name>Support Off-Path Caching</name>
<t> <t>
Caching in-network is considered to be a basic architectural component Caching in-network is considered to be a basic architectural component
of an ICN architecture. It may be used to provide a level of Quality-o of an ICN architecture. It may be used to provide a level of quality-o
f-Service (QoS) f-service (QoS)
experience to users, to reduce the overall network traffic, to prevent experience to users to reduce the overall network traffic, to prevent
network network
congestion and Denial-of-Service (DoS) attacks and to increase availab congestion and denial-of-service (DoS) attacks, and to increase availa
ility. bility.
Caching approaches can be categorized into off-path caching and on-pat h Caching approaches can be categorized into off-path caching and on-pat h
caching based on the location of caches in relation to the forwarding caching based on the location of caches in relation to the forwarding
path from the original server to the consumer. Off-path caching, also path from the original server to the consumer. Off-path caching, also
referred as content replication or content storing, aims to replicate referred to as "content replication" or "content storing", aims to rep licate
content within a network in order to increase availability, regardless of content within a network in order to increase availability, regardless of
the relationship of the location to the forwarding path. Thus, finding the relationship of the location to the forwarding path. Thus, finding
off-path cached objects is not trivial in name-based routing of ICN. off-path cached objects is not trivial in name-based routing of ICN.
In order to support off-path caches, replicas are usually advertised In order to support off-path caches, replicas are usually advertised
into a name-based routing system or into an NRS. into a name-based routing system or into an NRS.
</t> </t>
<t>
<t> In <xref target="Bayhan" format="default"/>, an NRS is used to find of
In <xref target="Bayhan"></xref>, an NRS is used to find off-path copi f-path copies
es
in the network, which may not be accessible via name-based routing mec hanisms. in the network, which may not be accessible via name-based routing mec hanisms.
Such capability can be helpful for an Autonomous System (AS) to avoid Such a capability can be helpful for an Autonomous System (AS) to avoi d
the costly inter-AS traffic for external content more, to yield higher the costly inter-AS traffic for external content more, to yield higher
bandwidth efficiency for intra-AS traffic, and to decrease the data bandwidth efficiency for intra-AS traffic, and to decrease the data
access latency for a pleasant user experience. access latency for a pleasant user experience.
</t>
</section>
<section title="Support nameless object">
<t>
In CCNx 1.0 <xref target="Mosko2"></xref>, the concept of "Nameless
Objects" that are a Content Object without a Name is introduced to
provide a means to move Content between storage replicas without havin
g
to rename or re-sign the content objects for the new name. Nameless
Objects can be addressed by the ContentObjectHash that is to restrict
Content Object matching by using SHA-256 hash.
</t> </t>
</section>
<t> <section numbered="true" toc="default">
An Interest message would still carry a Name and a ContentObjectHash, <name>Support Nameless Object</name>
where a Name is used for routing, while a ContentObjectHash is used <t>
In CCNx 1.0 <xref target="Mosko2" format="default"/>, the concept of a
"Nameless
Object", which is a Content Object without a name, is introduced to
provide a means to move content between storage replicas without havin
g
to rename or re-sign the Content Objects for the new name. Nameless
Objects can be addressed by the ContentObjectHash, which is to restric
t
Content Object matching by using a SHA-256 hash.
</t>
<t>
An Interest message would still carry a name and a ContentObjectHash,
where a name is used for routing, while a ContentObjectHash is used
for matching. However, on the reverse path, if the Content Object's for matching. However, on the reverse path, if the Content Object's
name is missing, it is a "Nameless Object" and only matches against th e name is missing, it is a "Nameless Object" and only matches against th e
ContentObjectHash. Therefore, a consumer needs to resolve proper name ContentObjectHash. Therefore, a consumer needs to resolve the proper n ame
and hashes through an outside system, which can be considered as an NR S. and hashes through an outside system, which can be considered as an NR S.
</t> </t>
</section>
</section> <section numbered="true" toc="default">
<name>Support Manifest</name>
<section title="Support manifest"> <t>
<t> For collections of data objects that are
For collections of data objects which are organized as large and file-like contents <xref target="I-D.irtf-icnrg-flic" for
organized as large and file mat="default"/>, manifests are used as data
like contents <xref target="FLIC"></xref>, manifests are used as data
structures to transport this information. Thus, manifests may contain structures to transport this information. Thus, manifests may contain
hash digests of signed content objects or other manifests, so that lar hash digests of signed Content Objects or other manifests so that larg
ge e
content objects which represent large piece of application data can be Content Objects that represent a large piece of application data can b
collected by using such manifest. e
</t> collected by using such a manifest.
</t>
<t> <t>
In order to request content objects, a co In order to request Content Objects, a co
nsumer needs to know a manifest nsumer needs to know a manifest
root name to acquire the manifest. In case of FLIC, a manifest name root name to acquire the manifest. In the case of File-Like ICN Collec
can be represented by a nameless root manifest, so that outside system tions (FLIC), a manifest name
can be represented by a nameless root manifest so that an outside syst
em
such as an NRS may be involved to give this information to the consume r. such as an NRS may be involved to give this information to the consume r.
</t> </t>
</section>
</section> <section numbered="true" toc="default">
<name>Support Metadata</name>
<section title="Support metadata"> <t>
<t> When resolving the name of a Content Object, NRS could return a rich
When resolving the name of a content object, NRS could return a rich
set of metadata in addition to returning a locator. The metadata set of metadata in addition to returning a locator. The metadata
could include alternative object locations, supported object transfe r could include alternative object locations, supported object transfe r
protocol(s), caching policy, security parameters, data format, hash protocol(s), caching policy, security parameters, data format, hash
of object data, etc. The consumer could use this metadata for select ion of object data, etc. The consumer could use this metadata for the se lection
of object transfer protocol, security mechanism, egress interface, e tc. of object transfer protocol, security mechanism, egress interface, e tc.
An example of how metadata can be used in this way is provided by th e An example of how metadata can be used in this way is provided by th e
NEO ICN architecture <xref target="NEO"></xref>. Networked Object (NEO) ICN architecture <xref target="NEO" format="d
</t> efault"/>.
</t>
</section> </section>
</section>
</section> <section numbered="true" toc="default">
<name>Design Considerations for NRS in ICN</name>
<section title="Design considerations for NRS in ICN">
<t> <t>
This section presents the design considerations for NRS in ICN. This section presents the design considerations for NRS in ICN.
</t> </t>
<section numbered="true" toc="default" anchor="res-response">
<section title="Resolution response time"> <name>Resolution Response Time</name>
<t> <t>
The name resolution process should provide a response within a reaso The name resolution process should provide a response within a reaso
nable amount of time. The response should be either a proper mapping of the name nable amount of time. The response should be either a proper mapping of the name
to a copy of the content, or an error message stating that no such object exist to a copy of the content or an error message stating that no such object exists
s. If the name resolution does not map to a location, the system may not issue a . If the name resolution does not map to a location, the system may not issue an
ny response, and the client should set a timer when sending a request, so as to y response, and the client should set a timer when sending a request so as to co
consider the resolution incomplete when the timer expires. nsider the resolution incomplete when the timer expires.
</t> </t>
<t> <t>
The acceptable response delay could be of the order of a round trip The acceptable response delay could be of the order of a round-trip
time between the client issuing the request and the NRS servers that time between the client issuing the request and the NRS servers that
provides the response. While this RTT may vary greatly depending on the proximi provide the response. While this RTT may vary greatly depending on the proximit
ty between the two end points, some upper bound need be used. y between the two end points, some upper bound needs to be used.
Especially, in some delay-sensitive scenarios such as industrial Int Especially in some delay-sensitive scenarios such as industrial Inte
ernet and telemedicine, the upper bound of the response delay must be guaranteed rnet and telemedicine, the upper bound of the response delay must be guaranteed.
. </t>
</t>
<!-- <t>
The response time should be within the same order of magnitude for m
ost pairs of a client issuing a request, and the NRS server responding to this r
equest.
</t>
-->
<t> <t>
The response time includes all the steps of the resolution, includin g potentially a hop-by-hop resolution or a hierarchical forwarding of the resolu tion request. The response time includes all the steps of the resolution, includin g potentially a hop-by-hop resolution or a hierarchical forwarding of the resolu tion request.
</t> </t>
<!--
<t>The name resolution process provided by the NRS must be completed wi
thin a minimum delay. If the name resolution takes too long, then the content re
quest packet may get dropped or it will yield the high content retrieval time fo
r content requestor. Thus, the content retrieval time has to be content requesto
r-tolerant.</t>
</section>
<!-- must not introduce significant latencies. With more number of name
record replications, the number of nodes involved in the name resolution may be
reduced. For example, in the explicit name resolution approach, with the name re
cord being replicated to higher hierarchy or the peer NRS server in the overlay,
the name resolution can be responded more promptly. In the name based routing a
pproach, with the content based routing table being broadcast within the larger
scope in the network, the name resolution and request routing can have higher pr
obability to successfully reach the nearer copy of the requested content.
The NRS deployment should balance the number of nodes involved in the n
ame resolution and the overhead/cost for the name record replication. To ensure
the low latency, the NRS should be able to route a content request to the closes
t copy. Message forwarding and processing should be efficient and computation co
mplexity should be reasonable low and affordable by the current processor techno
logies.
<section title="Time transiency">
<t>The NRS should support time-transient content, which is frequently c
reated in and disappearing from the network. This kind of content only stays in
the network for a short time, which requires the NRS to be able to promptly refl
ect the records of them in the system. For example, some video clip only exists
in the network for a very short time, which requires the NRS to promptly update
their name records. </t>
</section> </section>
<section numbered="true" toc="default">
<section title="Response accuracy"> <name>Response Accuracy</name>
<t>
<t> An NRS must provide an accurate response -- namely, a proper bindin
An NRS must provide an accurate response, namely a proper binding o g of the requested name (or prefix) with a location. The response can be either
f the requested name (or prefix) with a location. The response can be either a ( a (prefix, location) pair or the actual forwarding of a request to a node holdin
prefix, location) pair, or the actual forwarding of a request to a node holding g the content, which is then transmitted in return.
the content, which is then transmitted in return. </t>
</t> <t>
<t> An NRS must provide an up-to-date response -- namely, an NRS should
An NRS must provide an up-to-date response, namely an NRS should be be updated within a reasonable time when new copies of the content are being st
updated within a reasonable time when new copies of the content are being store ored in the network. While every transient cache addition/eviction should not tr
d in the network. While every transient cache addition/eviction should not trigg igger an NRS update, some origin servers may move and require the NRS to be upda
er an NRS update, some origin servers may move and require the NRS to be updated ted.
. </t>
</t> <t>
<t> An NRS must provide mechanisms to update the mapping of the content
An NRS must provide mechanisms to update the mapping of the content with its location. Namely, an NRS must provide a mechanism for a content provid
with its location. Namely, an NRS must provide a mechanism for a content provid er to add new content, revoke old/dated/obsolete content, and modify existing co
er to add new content, revoke old/dated/obsolete content, and modify existing co ntent. Any content update should then be propagated through
ntent. Any content update should then be propagated through the NRS system withi the NRS system within reasonable delay.
n reasonable delay. </t>
</t> <t>
<t> Content that is highly mobile may require specifying some type of a
Content that is highly mobile may require to specify some type of a nchor that is kept at the NRS instead of the content location.
nchor that is kept at the NRS, instead of the content location. </t>
</t>
<!--
<t>The NRS must provide accurate and up-to-date information on how to d
iscover the requested content with minimum overhead in propagating the update in
formation. For example, a content can be moved from one domain to another domain
due to the mobility of the producer, then the old name record should be deleted
from the NRS system and a new name record should be added and updated with mini
mum delay.</t>
Content mobility and expiration must be reflected in the corresponding
records in the NRS system with minimum delay to guarantee the accurate resolutio
n.
</section> </section>
<section numbered="true" toc="default">
<section title="Resolution guarantee"> <name>Resolution Guarantee</name>
<t> <t>
An NRS must ensure that the name resolution is successful An NRS must ensure that the name resolution is successful
with high probability if the name matching content exists in the ne with high probability if the name-matching content exists in the ne
twork, twork,
regardless of its popularity and number of cached copies existing i regardless of its popularity and the number of cached copies existi
n the network. ng in the network.
As per Section 4.1, some resolution may not occur in a timely manne Per <xref target="res-response"/>, some resolutions may not occur i
r. n a timely manner.
However, the probability of such event should be minimized. However, the probability of such an event should be minimized.
The NRS system may provide a probability (say, five 9s, or The NRS system may provide a probability (five 9s or
five sigmas for instance) that a resolution will be satisfied. five sigmas, for instance) that a resolution will be satisfied.
</t> </t>
<!--
<t>The NRS must ensure the name resolution success if the matching cont
ent exists in the network, regardless of its popularity, number of cached copies
. </t>
</section> </section>
<section numbered="true" toc="default">
<section title="Resolution fairness"> <name>Resolution Fairness</name>
<t> <t>
An NRS could provide this service for all content in a fair manner, independently of the specific content properties An NRS could provide this service for all content in a fair manner, independently of the specific content properties
(content producer, content popularity, availability of copies, cont ent format, etc.). (content producer, content popularity, availability of copies, cont ent format, etc.).
Fairness may be defined as a per request delay to complete the NRS steps that is not agnostic to the properties of the content itself. Fairness may be defined as a per-request delay to complete the NRS steps that is agnostic to the properties of the content itself.
Fairness may be defined as well as the number of requests answered per unit of time. Fairness may be defined as well as the number of requests answered per unit of time.
</t> </t>
<t> <t>
However, it is notable that content (or their associated producer) However, it is notable that content (or their associated producer)
may request a different level of QoS from the network (see <xref target="RFC9064 may request a different level of QoS from the network (see <xref target="RFC9064
"></xref> for instance), " format="default"/>, for instance),
and this may include the NRS as well, in which case considerations of fairness may be restricted to content within the same class of service. and this may include the NRS as well, in which case considerations of fairness may be restricted to content within the same class of service.
</t> </t>
</section>
</section> <section numbered="true" toc="default">
<name>Scalability</name>
<section title="Scalability"> <t>
<t>
The NRS system must scale up to support a very large user populatio n (including human users as well as machine-to-machine communications). The NRS system must scale up to support a very large user populatio n (including human users as well as machine-to-machine communications).
As an idea of the scale, it is expected that 50 billion devices wil l be connected in 2025 (per ITU projections). As an idea of the scale, it is expected that 50 billion devices wil l be connected in 2025 (per ITU projections).
The system must be able to respond to a very large number of reques ts per unit of time. The system must be able to respond to a very large number of reques ts per unit of time.
Message forwarding and processing, routing table building-up and na Message forwarding and processing, routing table buildup, and name
me records propagation must be efficient and scalable. record propagation must be efficient and scalable.
</t> </t>
<t> <t>
The NRS system must scale up with the number of pieces of content ( content names) and should be able to support a content catalog that is extremely large. The NRS system must scale up with the number of pieces of content ( content names) and should be able to support a content catalog that is extremely large.
Internet traffic is of the order of the zettabytes per year (10^21 bytes). Since NRS is associated with actual traffic, Internet traffic is of the order of zettabytes per year (10<sup>21< /sup> bytes). Since NRS is associated with actual traffic,
the number of pieces of content should scale with the amount of tra ffic. Content size may vary from a few bytes to several GB, the number of pieces of content should scale with the amount of tra ffic. Content size may vary from a few bytes to several GB,
so the NRS should be expected scale up to catalog of the size of 10 so the NRS should be expected scale up to a catalog of the size of
^21 in the near future, and larger beyond. 10<sup>21</sup> in the near future, and larger beyond.
</t> </t>
<t> <t>
The NRS system must be able to scale up, namely to add NRS servers The NRS system must be able to scale up -- namely, to add NRS serve
to the NRS system, in a way that is transparent to the users. rs to the NRS system in a way that is transparent to the users.
Addition of a new server should have limited negative impact on the The addition of a new server should have a limited negative impact
other NRS servers on the other NRS servers
(or should have a negative impact on only a small subset of the NRS servers). (or should have a negative impact on only a small subset of the NRS servers).
The impact of adding new servers may induce some overhead at the ot her servers to rebuild a hierarchy or to exchange messages to include the new se rver within the service. The impact of adding new servers may induce some overhead at the ot her servers to rebuild a hierarchy or to exchange messages to include the new se rver within the service.
Further, data may be shared among the new servers, for load balanci Further, data may be shared among the new servers for load balancin
ng or tolerance to failure. g or tolerance to failure.
These steps should not disrupt the service provided by the NRS and These steps should not disrupt the service provided by the NRS and
should in the long run improve the quality of the service. should improve the quality of the service in the long run.
</t> </t>
<t> <t>
The NRS system may support access from a heterogeneity of connectio n methods and devices. The NRS system may support access from a heterogeneity of connectio n methods and devices.
In particular, the NRS system may support access from constrained d In particular, the NRS system may support access from constrained d
evices and interactions with the NRS system would not be too costly. evices, and interactions with the NRS system would not be too costly.
An IoT node for instance should be able to access the NRS system as An IoT node, for instance, should be able to access the NRS system
well as a more powerful node. as well as a more powerful node.
</t> </t>
<t> <t>
The NRS system should scale up in its responsiveness to the increas The NRS system should scale up in its responsiveness to the increas
ed request rate that is expected from applications such as IoT or M2M, ed request rate that is expected from applications such as IoT or machine-to-mac
where data is being frequently generated and/or frequently requeste hine (M2M),
d. where data is being frequently generated and/or requested.
</t> </t>
</section>
</section> <section numbered="true" toc="default">
<name>Manageability</name>
<section title="Manageability"> <t>
<t>
The NRS system must be manageable since some parts of the system ma y grow or shrink dynamically and an NRS system node may be added or deleted freq uently. The NRS system must be manageable since some parts of the system ma y grow or shrink dynamically and an NRS system node may be added or deleted freq uently.
</t> </t>
<t> <t>
The NRS system may support an NRS management layer that allows for The NRS system may support an NRS management layer that allows for
adding or subtracting NRS nodes. In order to infer the circumstance, the manage adding or subtracting NRS nodes. In order to infer the circumstance, the manage
ment layer can measure network status. ment layer can measure the network status.
</t> </t>
<!--
<t>The NRS system must be manageable since some parts of the system may
grow or shrink dynamically and a NRS system node may be added or deleted. </t>
</section> </section>
<section numbered="true" toc="default">
<section title="Deployed system"> <name>Deployed System</name>
<t> <t>
The NRS system must be deployable since deployability is important for a real-world system. The NRS system must be deployable in network edges and cores so that the consumers as well as ICN routers can perform name resolution i n a very low latency. The NRS system must be deployable since deployability is important for a real-world system. The NRS system must be deployable in network edges and cores so that the consumers as well as ICN routers can perform name resolution i n a very low latency.
</t> </t>
<!--
<t>The NRS system must be deployable since deployability is important f
or a real world system. If the NRS system can be deployed from the edges, then t
he deployment can be simplified. </t>
</section> </section>
<section numbered="true" toc="default">
<section title="Fault tolerance"> <name>Fault Tolerance</name>
<t> <t>
The NRS system must ensure resiliency in the event of NRS server fa ilures. The NRS system must ensure resiliency in the event of NRS server fa ilures.
The failure of a small subset of nodes should not impact the NRS pe rformance significantly. The failure of a small subset of nodes should not impact the NRS pe rformance significantly.
</t> </t>
<t> <t>
After an NRS server fails, the NRS system must be able to recover a nd/or restore the name records stored in the NRS server. After an NRS server fails, the NRS system must be able to recover a nd/or restore the name records stored in the NRS server.
</t> </t>
<!--
<t>The NRS system must ensure resilience to node failures. After a NRS
node fails, the NRS system must be able to restore the name records stored in th
e NRS node. </t>
The NRS must also ensure resolution failure at one NRS node would be re
solved and corrected by other NRS nodes.
<t>For example, in the explicit name resolution approach, when a NRS ove
rlay server fails, the name records should be able to transferred and recovered
in its peer server or its replacement. In the name based approach, the failure o
f one ICN router does not cause much trouble in the name resolution, because the
other alternative paths can be established that bypass the failed ICN router. H
owever, it requires that the ICN router has propagated its name based routing in
formation in the network. </t>
</section> </section>
<section numbered="true" toc="default" anchor="sec-priv">
<section title="Security and privacy"> <name>Security and Privacy</name>
<t>
<t>
On utilizing an NRS in ICN, there are some security consideration s for the On utilizing an NRS in ICN, there are some security consideration s for the
NRS servers/nodes and name mapping records stored in the NRS syst em. NRS servers/nodes and name mapping records stored in the NRS syst em.
This subsection describes them. This subsection describes them.
</t> </t>
<section numbered="true" toc="default">
<section title="Confidentiality"> <name>Confidentiality</name>
<t> <t>
The name mapping records in the NRS system must be assigned with The name mapping records in the NRS system must be assigned with
proper access rights such that the information contained in the name proper access rights such that the information contained in the name
mapping records would not be revealed to unauthorized users . mapping records would not be revealed to unauthorized users .
</t> </t>
<t> <t>
The NRS system may support access control for certain name mapping The NRS system may support access control for certain name mapping
records. Access control can be implemented with a reference monitor records. Access control can be implemented with a reference monitor
that uses client authentication, so only users with appropr iate that uses client authentication, so only users with appropr iate
credentials can access these records, and they are not shar ed with credentials can access these records, and they are not shar ed with
unauthorized users. Access control can also be implemented by unauthorized users. Access control can also be implemented by
encryption-based techniques using control of keys to contro l the encryption-based techniques using control of keys to contro l the
propagations of the mappings. propagations of the mappings.
</t> </t>
<t> <t>
The NRS system may support obfuscation and/or encryption The NRS system may support obfuscation and/or encryption
mechanisms so that the content of a resolution request mechanisms so that the content of a resolution request
may not be accessible by third parties outside of the NRS s ystem. may not be accessible by third parties outside of the NRS s ystem.
</t> </t>
<t> <t>
The NRS system must keep confidentiality to prevent The NRS system must keep confidentiality to prevent
sensitive name mapping records from being reached by sensitive name mapping records from being reached by
unauthorized data requesters. This is more required unauthorized data requesters. This is more required
in IoT environments where a lot of sensitive data is produc ed. in IoT environments where a lot of sensitive data is produc ed.
</t> </t>
<t> <t>
The NRS system must also keep confidentiality of meta-data The NRS system must also keep confidentiality of metadata
as well as NRS usage to protect the privacy of the users. as well as NRS usage to protect the privacy of the users.
For instance, a specific user's NRS requests should For instance, a specific user's NRS requests should
not be shared outside the NRS system (with the exception not be shared outside the NRS system (with the exception
of legal intercept). of legal intercept).
</t> </t>
</section> </section>
<section numbered="true" toc="default">
<section title="Authentication"> <name>Authentication</name>
<t> <ul spacing="normal">
<list style="symbols"> <li>
<t>
NRS server authentication: Authentication of the ne w NRS NRS server authentication: Authentication of the ne w NRS
servers/nodes that want to be registered with the N RS system servers/nodes that want to be registered with the N RS system
must be required so that only authenticated entitie s can must be required so that only authenticated entitie s can
store and update name mapping records. The NRS syst em should store and update name mapping records. The NRS syst em should
detect an attacker attempting to act as a fake NRS server detect an attacker attempting to act as a fake NRS server
to cause service disruption or manipulate name mapp ing records. to cause service disruption or manipulate name mapp ing records.
</t> </li>
<t> <li>
Producer authentication: The NRS system must suppor t Producer authentication: The NRS system must suppor t
authentication of the content producers to ensure t hat authentication of the content producers to ensure t hat
update/addition/removal of name mapping records req uested update/addition/removal of name mapping records req uested
by content producers are actually valid and that co ntent by content producers are actually valid and that co ntent
producers are authorized to modify (or revoke) thes e records producers are authorized to modify (or revoke) thes e records
or add new records. or add new records.
</t> </li>
<t> <li>
Mapping record authentication: The NRS should verif y new Mapping record authentication: The NRS should verif y new
mapping records that are being registered so that i t cannot mapping records that are being registered so that i t cannot
be polluted with falsified information or invalid r ecords. be polluted with falsified information or invalid r ecords.
</t> </li>
</ul>
</list> </section>
</t> <section numbered="true" toc="default">
<name>Integrity</name>
</section> <t>
The NRS system must be protected from malicious users
<section title="Integrity">
<t>
The NRS system must be prevented from malicious users
attempting to hijack or corrupt the name mapping records. attempting to hijack or corrupt the name mapping records.
</t> </t>
</section>
</section> <section numbered="true" toc="default">
<name>Resiliency and Availability</name>
<section title="Resiliency and availability"> <t>
<t> The NRS system should be resilient against denial-of-servic
The NRS system should be resilient against denial of servic e attacks
e attacks
and other common attacks to isolate the impact of the attac ks and and other common attacks to isolate the impact of the attac ks and
prevent collateral damage to the entire system. Therefore, if a prevent collateral damage to the entire system. Therefore, if a
part of the NRS system fails, the failure should only affec t a local part of the NRS system fails, the failure should only affec t a local
domain. And fast recovery mechanisms need to be in place to bring domain. And fast recovery mechanisms need to be in place to bring
the service back to normal. the service back to normal.
</t> </t>
</section> </section>
</section>
</section> </section>
<section numbered="true" toc="default">
</section> <name>Conclusion</name>
<t>
<section title="Conclusion">
<t>
ICN routing may comprise three steps: name resolution, content request routi ng, ICN routing may comprise three steps: name resolution, content request routi ng,
and content delivery. This document investigates the name resolution step, and content delivery. This document investigates the name resolution step,
which is the first and most important to be achieved for ICN routing to be which is the first and most important to be achieved for ICN routing to be
successful. A Name Resolution Service (NRS) in ICN is defined as the service successful. A Name Resolution Service (NRS) in ICN is defined as the service
that provides such a function of name resolution for translating an object that provides such a function of name resolution for translating an object
name into some other information such as a locator, another name, metadata, name into some other information such as a locator, another name, metadata,
next hop info, etc. that is used for forwarding the object request. next-hop info, etc. that is used for forwarding the object request.
</t> </t>
<t> <t>
This document classifies and analyzes the NRS approaches according to whethe r This document classifies and analyzes the NRS approaches according to whethe r
the name resolution step is separated from the content request routing as an the name resolution step is separated from the content request routing as an
explicit process or not. This document also explains the NRS functions used explicit process or not. This document also explains the NRS functions used
to support heterogeneous name types, producer mobility, scalable routing sys tem, to support heterogeneous name types, producer mobility, scalable routing sys tem,
off-path caching, nameless object, manifest, and metadata. Finally, this doc ument off-path caching, nameless object, manifest, and metadata. Finally, this doc ument
presents design considerations for NRS in ICN, which include resolution resp onse presents design considerations for NRS in ICN, which include resolution resp onse
time and accuracy, resolution guarantee, resolution fairness, scalability, time and accuracy, resolution guarantee, resolution fairness, scalability,
manageability, deployed system, and fault tolerance. manageability, deployed system, and fault tolerance.
</t> </t>
</section> </section>
<section anchor="IANA" numbered="true" toc="default">
<section anchor="IANA" title="IANA Considerations"> <name>IANA Considerations</name>
<t>There are no IANA considerations related to this document.</t> <t>This document has no IANA actions.</t>
</section> </section>
<section numbered="true" toc="default">
<section title="Security Considerations"> <name>Security Considerations</name>
<t> <t>
A discussion of security guidelines was provided in section 4.9. A discussion of security guidelines is provided in <xref target="sec-pri v"/>.
</t> </t>
</section>
</section> </middle>
</middle>
<!-- *****BACK MATTER ***** -->
<back> <back>
<!-- References split into informative and normative -->
<!-- There are 2 ways to insert reference entries from the citation librarie
s:
1. define an ENTITY at the top, and use "ampersand character"RFC2629; here
(as shown)
2. simply use a PI "less than character"?rfc include="reference.RFC.2119.xm
l"?> here
(for I-Ds: include="reference.I-D.narten-iana-considerations-rfc2434bis.xml
")
Both are cited textually in the same manner: by using xref elements.
If you use the PI option, xml2rfc will, by default, try to find included fi
les in the same
directory as the including file. You can also define the XML_LIBRARY enviro
nment variable
with a value containing a set of directories to search. These can be eithe
r in the local
filing system or remote ones accessed by http (http://domain/dir/... ).-->
<references title="Normative References">
&rfc7927;
</references>
<references title="Informative References">
<reference anchor='Ahlgren'>
<front>
<title>A Survey of Information-Centric Networking</title>
<author initials='B.' surname='Ahlgren' fullname='B. Ahlgren'></author
>
<author initials='C.' surname='Dannewitz' fullname='C. Dannewitz'></au
thor>
<author initials='C.' surname='Imbrenda' fullname='C. Imbrenda'></auth
or>
<author initials='D.' surname='Kutscher' fullname='D. Kutscher'></auth
or>
<author initials='B.' surname='Ohlman' fullname='B. Ohlman'></author>
<date month='' year='2012' />
</front>
<seriesInfo name='IEEE Communications Magarzine' value='Vol.50, Issue 7'
/>
</reference>
<reference anchor='Xylomenos'>
<front>
<title>A Survey of Information-Centric Networking Research,Communicati
ons Surveys and Tutorials</title>
<author initials='G.' surname='Xylomenos' fullname='G. Xylomenos'></au
thor>
<author initials='C. N.' surname='Ververidis' fullname='C. N. Ververid
is'></author>
<author initials='V. A.' surname='Siris' fullname='V. A. Siris'></auth
or>
<author initials='N.' surname='Fotiou' fullname='N. Fotiou'></author>
<author initials='C.' surname='Tsilopoulos' fullname='C.Tsilopoulos'><
/author>
<author initials='X.' surname='Vasilako' fullname='X. Vasilako'></auth
or>
<author initials='K. V.' surname='Katsaros' fullname='K. V. Katsaros'>
</author>
<author initials='G. C.' surname='Polyzos' fullname='G. C. Polyzos'></
author>
<date month='' year='2014' />
</front>
<seriesInfo name='IEEE Communications Surveys and Tutorials' value='vol.
16, no. 2' />
</reference>
<reference anchor='Baccelli'>
<front>
<title>Information Centric Networking in the IoT: Experiments with NDN
in the Wild</title>
<author initials='E.' surname='Baccelli' fullname='E. Baccelli'></auth
or>
<author initials='C.' surname='Mehlis' fullname='C. Mehlis'></author>
<author initials='O.' surname='Hahm' fullname='O. Hahm'></author>
<author initials='T.' surname='Schmidt' fullname='T. Schmidt'></author
>
<author initials='M.' surname='Wahlisch' fullname='M. Wahlisch'></auth
or>
<date month='' year='2014' />
</front>
<seriesInfo name='ACM ICN' value='2014' />
</reference>
<reference anchor='Amadeo'>
<front>
<title>Named data networking for IoT: An architectural perspective</ti
tle>
<author initials='M.' surname='Amadeo' fullname='M. Amadeo'></author>
<author initials='C.' surname='Campolo' fullname='C. Campolo'></author
>
<author initials='A.' surname='Iera' fullname='A. Iera'></author>
<author initials='A.' surname='Molinaro' fullname='A. Molinaro'></auth
or>
<date month='' year='2014' />
</front>
<seriesInfo name='European Conference on Networks and Communications (Eu
CNC)' value='' />
</reference>
<reference anchor='Quevedo'>
<front>
<title>A case for ICN usage in IoT environments</title>
<author initials='J.' surname='Quevedo' fullname='J. Quevedo'></
author>
<author initials='D.' surname='Corujo' fullname='D. Corujo'></au
thor>
<author initials='R.' surname='Aguiar' fullname='R. Aguiar'></au
thor>
<date month='' year='2014' />
</front>
<seriesInfo name='IEEE GLOBECOM' value='' />
</reference>
<reference anchor='Amadeo2'> <displayreference target="I-D.irtf-icnrg-icniot" to="ID.Zhang2"/>
<displayreference target="I-D.ravi-icnrg-ccn-forwarding-label" to="Ravindran"/>
<front> <displayreference target="I-D.irtf-icnrg-flic" to="FLIC"/>
<title>Information-centric networking for the internet of things: chal <displayreference target="I-D.irtf-icnrg-nrsarch-considerations" to="NRSarch"/>
lenges and opportunitiesve</title> <references>
<author initials='' surname='Amadeo, M. et al.' fullname='Amadeo, M. et al.' <name>References</name>
></author> <references>
<date month='July' year='2016' /> <name>Normative References</name>
<xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.R
</front> FC.7927.xml"/>
<seriesInfo name='IEEE Network' value='vol. 30, no. 2' /> </references>
<references>
</reference> <name>Informative References</name>
<xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.R
<reference anchor='ID.Zhang2'> FC.8569.xml"/>
<front>
<title>Design Considerations for Applying ICN to IoT</title>
<author initials='' surname='Ravindran, R. et al.' fullname='Rav
indran, R. et al.'></author>
<date month='May' year='2019' />
</front>
<seriesInfo name='draft-zhang-icnrg-icniot-03' value='' />
</reference>
<reference anchor='Koponen'>
<front>
<title>A Data-Oriented (and Beyond) Network Architecture</title>
<author initials='T.' surname='Koponen' fullname='T. Koponen'></author
>
<author initials='M.' surname='Chawla' fullname='M. Chawla'></author>
<author initials='B.' surname='Chun' fullname='B. Chun'></author>
<author initials='A.' surname='Ermolinskiy' fullname='A. Ermolinskiy'>
</author>
<author initials='K. H.' surname='Kim' fullname='K. H. Kim'></author>
<author initials='S.' surname='Shenker' fullname='S. Shenker'></author
>
<author initials='I.' surname='Stoica' fullname='I. Stoica'></author>
<date month='' year='2007' />
</front>
<seriesInfo name='ACM SIGCOMM' value='2007 pp. 181-192' />
</reference>
<reference anchor='PURSUIT'>
<front>
<title>FP7 PURSUIT project.</title>
<author initials='' surname='' fullname=''></author>
<date month='' year='' />
</front>
<seriesInfo name='http://www.fp7-pursuit.eu/PursuitWeb/' value='' />
</reference>
<reference anchor='SAIL'>
<front>
<title>FP7 SAIL project.</title>
<author initials='' surname='' fullname=''></author>
<date month='' year='' />
</front>
<seriesInfo name='http://www.sail-project.eu/' value='' />
</reference>
<reference anchor='NDN'>
<front>
<title>NSF Named Data Networking project.</title>
<author initials='' surname='' fullname=''></author>
<date month='' year='' />
</front>
<seriesInfo name='http://www.named-data.net' value='' />
</reference>
<reference anchor='CCNx'>
<front>
<title>Content Centric Networking project.</title>
<author initials='' surname='' fullname=''></author>
<date month='' year='' />
</front>
<seriesInfo name='https://wiki.fd.io/view/Cicn' value='' />
</reference>
<reference anchor='MF'>
<front>
<title>NSF Mobility First project.</title>
<author initials='' surname='' fullname=''></author>
<date month='' year='' />
</front>
<seriesInfo name='http://mobilityfirst.winlab.rutgers.edu/' value='' />
</reference>
<reference anchor='Jung'>
<front>
<title>IDNet: Beyond All-IP Network</title>
<author initials='' surname='Jung, H. et al.' fullname='H. Jung et al.
' ></author>
<date month='October' year='2015' />
</front>
<seriesInfo name='ETRI Jouranl' value='vol. 37, no. 5' />
</reference>
<reference anchor="SA2-5GLAN">
<front>
<title>SP-181129, Work Item Description, Vertical_LAN(SA2), 5GS Enhan
ced Support of Vertical and LAN Services</title>
<author initials="" surname="3gpp-5glan" />
<date year="http://www.3gpp.org/ftp/tsg_sa/TSG_SA/TSGS_82/Docs/SP-181
120.zip"/>
</front>
<seriesInfo name="3GPP" value=""/>
</reference>
<!--
<reference anchor='Jacobson'>
<front>
<title>Networking Named Content</title>
<author initials='V.' surname='Jacobson' fullname='V. Jacobson'></auth
or>
<author initials='D. K.' surname='Smetters' fullname='D. K. Smetters'>
</author>
<author initials='J. D.' surname='Thornton' fullname='J. D. Thornton'>
</author>
<author initials='M. F.' surname='Plass' fullname='M. F. Plass'></auth
or>
<author initials='N. H.' surname='Briggs' fullname='N. H. Briggs'></au
thor>
<author initials='R. L.' surname='Braynard' fullname='R. L. Braynard'>
</author>
<date month='' year='2009' />
</front>
<seriesInfo name='ACM CoNEXT' value='' />
</reference>
<reference anchor='Baid'>
<front>
<title>Comparing Alternative Approaches for Networking of Named Object
s in the Future Internet</title>
<author initials='A.' surname='Baid' fullname='A. Baid'></author>
<author initials='T.' surname='Vu' fullname='T. Vu'></author>
<author initials='D.' surname='Raychaudhuri' fullname='D. Raychaudhuri
'></author>
<date month='' year='2012' />
</front>
<seriesInfo name='IEEE Workshop on Emerging Design Choices in Name-Orien
ted Networking (NOMEN)' value='' />
</reference>
<reference anchor='Bari'>
<front>
<title>A Survey of Naming and Routing in Information-Centric Networks<
/title>
<author initials='M. F.' surname='Bari' fullname='M. F. Bari'></author
>
<author initials='S. R.' surname='Chowdhury' fullname='S. R. Chowdhury
'></author>
<author initials='R.' surname='Ahmed' fullname='R. Ahmed'></author>
<author initials='R.' surname='Boutaba' fullname='R. Boutaba'></author
>
<author initials='B.' surname='Mathieu' fullname='B. Mathieu'></author
>
<date month='' year='2012' />
</front>
<seriesInfo name='IEEE Communications Magazine' value='Vol. 50, No. 12,
P.44-53' />
</reference>
<!-- <reference anchor="Ahlgren">
<reference anchor='Rajahalme'> <front>
<front> <title>A Survey of Information-Centric Networking</title>
<title>On Name-based Inter-domain Routing</title> <author initials="B." surname="Ahlgren" fullname="B. Ahlgren"/>
<author initials='J.' surname='Rajahalme' fullname='J. Rajahalme'></au <author initials="C." surname="Dannewitz" fullname="C. Dannewitz"/>
thor> <author initials="C." surname="Imbrenda" fullname="C. Imbrenda"/>
<author initials='M.' surname='Sarela' fullname='M. Sarela'></author> <author initials="D." surname="Kutscher" fullname="D. Kutscher"/>
<author initials='K.' surname='Visala' fullname='K. Visala'></author> <author initials="B." surname="Ohlman" fullname="B. Ohlman"/>
<author initials='J.' surname='Riihijarvi' fullname='J. Riihijarvi'></ <date month="July" year="2012"/>
author> </front>
<date month='March' year='2011' /> <seriesInfo name="DOI" value="10.1109/MCOM.2012.6231276"/>
</front> <refcontent>IEEE Communications Magazine, Vol. 50, Issue 7</refcontent
<seriesInfo name='Computer Networks' value='Vol. 55, No. 4, P. 975-986' >
/> </reference>
</reference>
<reference anchor='Katsaros'> <reference anchor="Xylomenos">
<front> <front>
<title>On Inter-Domain Name Resolution for Information-Centric Network <title>A Survey of Information-Centric Networking Research</title>
s</title> <author initials="G." surname="Xylomenos" fullname="G. Xylomenos"/>
<author initials='K. V.' surname='Katsaros' fullname='K. V. Katsaros'> <author initials="C." surname="Ververidis" fullname="C. Ververidis"/
</author> >
<author initials='N.' surname='Fotiou' fullname='N. Fotiou'></author> <author initials="V." surname="Siris" fullname="V. Siris"/>
<author initials='X.' surname='Vasilakos' fullname='X. Vasilakos'></au <author initials="N." surname="Fotiou" fullname="N. Fotiou"/>
thor> <author initials="C." surname="Tsilopoulos" fullname="C.Tsilopoulos"
<author initials='C. N.' surname='Ververidis' fullname='C. N. Ververid />
is'></author> <author initials="X." surname="Vasilakos" fullname="X. Vasilakos"/>
<author initials='C.' surname='Tsilopoulos' fullname='C. Tsilopoulos'> <author initials="K." surname="Katsaros" fullname="K. Katsaros"/>
</author> <author initials="G." surname="Polyzos" fullname="G. Polyzos"/>
<author initials='G.' surname='Xylomenos' fullname='G. Xylomenos'></au <date year="2014"/>
thor> </front>
<author initials='G. C.' surname='Polyzos' fullname='G. C. Polyzos'></ <seriesInfo name="DOI" value="10.1109/SURV.2013.070813.00063"/>
author> <refcontent>IEEE Communications Surveys and Tutorials, Vol. 16, Issue
<date month='' year='2012' /> 2</refcontent>
</front> </reference>
<seriesInfo name='Proc.IFIP-TC6 Networking Conference' value='' />
</reference>
<reference anchor='ID.Wang'> <reference anchor="Baccelli">
<front> <front>
<title>Namespace Resolution in Future Internet Architectures</title> <title>Information Centric Networking in the IoT: Experiments with N
<author initials='J.' surname='Wang' fullname='J. Wang'></author> DN in the Wild</title>
<author initials='S.' surname='Li' fullname='S. Li'></author> <author initials="E." surname="Baccelli" fullname="E. Baccelli"/>
<author initials='C.' surname='Wetphal' fullname='C. Wetphal'></author <author initials="C." surname="Mehlis" fullname="C. Mehlis"/>
> <author initials="O." surname="Hahm" fullname="O. Hahm"/>
<date month='October' year='2015' /> <author initials="T." surname="Schmidt" fullname="T. Schmidt"/>
</front> <author initials="M." surname="Wählisch" fullname="M. Wählisch"/>
<seriesInfo name='draft-wang-fia-namespace-01' value='' /> <date month="" year="2014"/>
</reference> </front>
<seriesInfo name="DOI" value="10.1145/2660129.2660144"/>
<refcontent>ACM-ICN 2014</refcontent>
</reference>
<reference anchor='ID.Zhang'> <reference anchor="Amadeo">
<front> <front>
<title>PID: A Generic Naming Schema for Information-centric Network</t <title>Named data networking for IoT: An architectural perspective</
itle> title>
<author initials='X.' surname='Zhang' fullname='X. Zhang'></author> <author initials="M." surname="Amadeo" fullname="M. Amadeo"/>
<author initials='R.' surname='Ravindran' fullname='R. Ravindran'></au <author initials="C." surname="Campolo" fullname="C. Campolo"/>
thor> <author initials="A." surname="Iera" fullname="A. Iera"/>
<author initials='H.' surname='Xie' fullname='H. Xie'></author> <author initials="A." surname="Molinaro" fullname="A. Molinaro"/>
<author initials='G.' surname='Wang' fullname='G. Wang'></author> <date month="June" year="2014"/>
<date month='August' year='2013' /> </front>
</front> <seriesInfo name="DOI" value="10.1109/EuCNC.2014.6882665"/>
<seriesInfo name='draft-zhang-icnrg-pid-naming-scheme-03' value='' /> <refcontent>European Conference on Networks and Communications (EuCNC)
</reference> </refcontent>
</reference>
<reference anchor='D.Zhang'> <reference anchor="Quevedo">
<front> <front>
<title>Routing and Name Resolution in Information-Centric Networks</ti <title>A case for ICN usage in IoT environments</title>
tle> <author initials="J." surname="Quevedo" fullname="J. Quevedo"/>
<author initials='D.' surname='Zhang' fullname='D. Zhang'></author> <author initials="D." surname="Corujo" fullname="D. Corujo"/>
<author initials='H.' surname='Liu' fullname='H. Liu'></author> <author initials="R." surname="Aguiar" fullname="R. Aguiar"/>
<date month='' year='2013' /> <date month="December" year="2014"/>
</front> </front>
<seriesInfo name='22nd International Conference on Computer Communicatio <seriesInfo name="DOI" value="GLOCOM.2014.7037227"/>
ns and Networks (ICCCN)' value='' /> <refcontent>IEEE GLOBECOM</refcontent>
</reference> </reference>
<reference anchor='Sevilla'> <reference anchor="Amadeo2">
<front> <front>
<title>iDNS: Enabling Information Centric Networking Through The DNS</ <title>Information-centric networking for the internet of things: ch
title> allenges and opportunities</title>
<author initials='S.' surname='Sevilla' fullname='S. Sevilla'></author <author initials="" surname="Amadeo, M. et al." fullname="Amadeo, M.
> et al."/>
<author initials='P.' surname='Mahadevan' fullname='P. Mahadevan'></au <date month="March" year="2016"/>
thor> </front>
<author initials='J.' surname='Garcia-Luna-Aceves' fullname='J. Garcia <seriesInfo name="DOI" value="10.1109/MNET.2016.7437030"/>
-Luna-Aceves'></author> <refcontent>IEEE Network, Vol. 30, No. 2</refcontent>
<date month='' year='2014' /> </reference>
</front>
<seriesInfo name='Name Oriented Mobility (workshop co-located with Infoc
om 2014)' value='' />
</reference>
&rfc1498; <xi:include href="https://datatracker.ietf.org/doc/bibxml3/reference.I-D.irtf-ic nrg-icniot.xml"/>;
<reference anchor='oneM2M'> <reference anchor="Koponen">
<front> <front>
<title>oneM2M Functional Architecture TS 0001.</title> <title>A Data-Oriented (and Beyond) Network Architecture</title>
<author initials='' surname='' fullname=''></author> <author initials="T." surname="Koponen" fullname="T. Koponen"/>
<date month='' year='' /> <author initials="M." surname="Chawla" fullname="M. Chawla"/>
</front> <author initials="B." surname="Chun" fullname="B. Chun"/>
<seriesInfo name='http://www.onem2m.org/technical/published-documents.' <author initials="A." surname="Ermolinskiy" fullname="A. Ermolinskiy
value='' /> "/>
</reference> <author initials="K.H." surname="Kim" fullname="K.H. Kim"/>
<author initials="S." surname="Shenker" fullname="S. Shenker"/>
<author initials="I." surname="Stoica" fullname="I. Stoica"/>
<date month="August" year="2007"/>
</front>
<seriesInfo name="DOI" value="10.1145/1282380.1282402"/>
<refcontent>ACM SIGCOMM 2007, pp. 181-192 </refcontent>
</reference>
&rfc7252; <reference anchor="PURSUIT" target="https://www.fp7-pursuit.eu/">
<front>
<title>FP7 PURSUIT</title>
<author />
<date/>
</front>
</reference>
<reference anchor='ID.Shelby'> <reference anchor="SAIL" target="http://www.sail-project.eu/">
<front> <front>
<title>CoRE Resource Directory</title> <title>Scalable and Adaptive Internet Solutions (SAIL)</title>
<author initials='Z.' surname='Shelby' fullname='Z. Shelby'></au <author/>
thor> <date/>
<date month='March' year='2017' /> </front>
</front> </reference>
<seriesInfo name='draft-ietf-core-resource-directory-10' value='' />
</reference>
<reference anchor='CoRE'> <reference anchor="NDN" target="http://www.named-data.net">
<front> <front>
<title>Constrained RESTful Environments, CoRE</title> <title>Named Data Networking</title>
<author initials='' surname='' fullname=''></author> <author/>
<date month='March' year='2013' /> <date/>
</front> </front>
<seriesInfo name='https://datatracker.ietf.org/wg/core/charter/' value=' </reference>
' />
</reference>
<reference anchor='Westphal'> <reference anchor="CCNx" target="https://wiki.fd.io/view/Cicn">
<front> <front>
<title>An IP-based Manifest Architecture for ICN</title> <title>CICN</title>
<author initials='C.' surname='Westphal' fullname='C. Westphal'> <author/>
</author> <date/>
<author initials='E.' surname='Demirors' fullname='E. Demirors'> </front>
</author> </reference>
<date month='' year='2015' />
</front>
<seriesInfo name='ACM ICN' value='' />
</reference>
<reference anchor='Mosko'> <reference anchor="MF" target="http://mobilityfirst.winlab.rutgers.edu">
<front> <front>
<title>CCNx Manifest Specification</title> <title>MobilityFirst Future Internet Architecture Project Overview</
<author initials='M.' surname='Mosko' fullname='M. Mosko'></author> title>
<author initials='G.' surname='Scott' fullname='G. Scott'></author> <author/>
<author initials='I.' surname='Solis' fullname='I. Solis'></author> <date/>
<author initials='C.' surname='Wood' fullname='C. Wood'></author> </front>
<date month='July' year='2015' /> </reference>
</front>
<seriesInfo name='draft-wood-icnrg-ccnxmanifests-00' value='' />
</reference>
<!-- <reference anchor="Jung">
&rfc6830; <front>
&rfc6833; <title>IDNet: Beyond All-IP Network</title>
<author initials="" surname="Jung, H. et al." fullname="H. Jung et a
l."/>
<date month="October" year="2015"/>
</front>
<seriesInfo name="DOI" value="10.4218/etrij.15.2415.0045"/>
<refcontent>ETRI Journal, Vol. 37, Issue 5</refcontent>
</reference>
<reference anchor='RFC6920'> <reference anchor="SA2-5GLAN" target="http://www.3gpp.org/ftp/tsg_sa/TSG
<front> _SA/TSGS_82/Docs/SP-181120.zip">
<title>Naming Things with Hashes</title> <front>
<author initials='S.' surname='Farrell ' fullname='Stephen Farrell'></ <title>New WID: 5GS Enhanced support of Vertical and LAN Services</t
author> itle>
<author initials='D.' surname='Kutscher' fullname='Dirk Kutscher'></au <author><organization>3GPP</organization></author>
thor> <date month="December" year="2018"/>
<author initials='C.' surname='Dannewitz' fullname='Christian Dannewit </front>
z'></author> <refcontent>TSG SA Meeting #SP-82</refcontent>
<author initials='B.' surname='Ohlman' fullname='Borje Ohlman'></autho </reference>
r>
<author initials='A.' surname='Keranen' fullname='Ari Keranen'></autho
r>
<author initials='P.' surname='Hallam-Baker' fullname='Phillip Hallam-
Baker'></author>
<date month='April' year='2013' />
</front>
<seriesInfo name='RFC6920, DOI 10.17487/RFC6920, https://rfc-editor.org/
rfc/rfc6920.txt' value='' />
</reference>
<!-- <reference anchor="Bari">
<reference anchor='Zhang'> <front>
<front> <title>A Survey of Naming and Routing in Information-Centric Network
<title>Named data networking</title> s</title>
<author initials='' surname='Zhang, L. et al.' fullname='L. Zhang et al.'></au <author initials="M.F." surname="Bari" fullname="M.F. Bari"/>
thor> <author initials="S.R." surname="Chowdhury" fullname="S.R. Chowdhury
<date month='July' year='2014' /> "/>
</front> <author initials="R." surname="Ahmed" fullname="R. Ahmed"/>
<seriesInfo name='ACM SIGCOMM Computer Communication Review' value='vol. 44, <author initials="R." surname="Boutaba" fullname="R. Boutaba"/>
no. 3' /> <author initials="B." surname="Mathieu" fullname="B. Mathieu"/>
</reference> <date month="December" year="2012"/>
<reference anchor='Zhang2'> </front>
<front> <seriesInfo name="DOI" value="10.1109/MCOM.2012.6384450"/>
<title>A Survey of Mobility Support in Named Data Networking</title> <refcontent>IEEE Communications Magazine, Vol. 50, No. 12, pp. 44-53</
<author initials='' surname='Zhang, Y. et al.' fullname='Y. Zhang et a refcontent>
l.'></author> </reference>
<date month='' year='2016'/>
</front>
<seriesInfo name='IEEE Conference on Computer Communications Workshops'
value='' />
</reference>
<reference anchor='Dannewitz'> <reference anchor="Westphal">
<front> <front>
<title> Network of Information (NetInf)-An information centric networking ar <title>An IP-Based Manifest Architecture for ICN</title>
chitecture </title> <author initials="C." surname="Westphal" fullname="C. Westphal"/>
<author initials='' surname='Dannewitz, C. et al.' fullname='C. Dannewitz et <author initials="E." surname="Demirors" fullname="E. Demirors"/>
al.' ></author> <date month="September" year="2015"/>
<date month='April' year='2013' /> </front>
</front> <seriesInfo name="DOI" value="10.1145/2810156.2812614"/>
<seriesInfo name='Computer Communications' value='vol. 36, no. 7' /> <refcontent>ACM-ICN 2015</refcontent>
</reference> </reference>
<!-- <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.6920.
<reference anchor='Seskar'> xml"/>
<front>
<title>MobilityFirst Future Internet Architecture Project</title>
<author initials='I.' surname='Seskar' fullname='I. Seskar' ></author>
<author initials='K.' surname='Nagaraja' fullname='K. Nagaraja' ></author>
<author initials='S.' surname='Nelson' fullname='S. Nelson' ></author>
<author initials='D.' surname='Raychaudhuri' fullname='D. Raychaudhurin' ><
/author>
<date month='November' year='2011' />
</front>
<seriesInfo name='7th Asian Internet Engineering Conference' value='' />
</reference>
<reference anchor='Dannewitz2'> <reference anchor="Zhang2">
<front> <front>
<title>Hierarchical DHT-based name resolution for Information-Centric Networ <title>A Survey of Mobility Support in Named Data Networking</title>
ks</title> <author initials="" surname="Zhang, Y. et al." fullname="Y. Zhang et
<author initials='C.' surname='Dannewitz' fullname='C. Dannewitz' ></author> al."/>
<author initials='M.' surname='DAmbrosio' fullname='M. DAmbrosio' ></author> <date month="April" year="2016"/>
<author initials='V.' surname='Vercellone' fullname='V. Vercellone' ></autho </front>
r> <seriesInfo name="DOI" value="10.1109/INFCOMW.2016.7562050"/>
<date month='April' year='2013' /> <refcontent>IEEE Conference on Computer Communications Workshops</refc
</front> ontent>
<seriesInfo name='Computer Communications' value='vol. 36, no. 7' /> </reference>
</reference>
<reference anchor='Vu'> <reference anchor="Dannewitz">
<front> <front>
<title>DMap: A Shared Hosting Scheme for Dynamic Identifier to Locator Mappi <title> Network of Information (NetInf) - An information-centric net
ng in the Global Internet </title> working architecture </title>
<author initials='' surname='Vu, T. et al.' fullname='T. Vu et al' ></author <author initials="" surname="Dannewitz, C. et al." fullname="C. Dann
> ewitz et al."/>
<date month='' year='2012' /> <date month="April" year="2013"/>
</front> </front>
<seriesInfo name='IEEE 32nd International Conference on Distributed Computin <seriesInfo name="DOI" value="10.1016/j.comcom.2013.01.009"/>
g Systems' value='' /> <refcontent>Computer Communications, Vol. 36, Issue 7</refcontent>
</reference> </reference>
<reference anchor='Hong'> <xi:include href="https://datatracker.ietf.org/doc/bibxml3/reference.I-D.ravi-ic
<front> nrg-ccn-forwarding-label.xml"/>
<title>Demonstrating a Scalable Name Resolution System for Information-Centr
ic Networking </title>
<author initials='J.' surname='Hong' fullname='J. Hong' ></author>
<author initials='W.' surname='Chun' fullname='W. Chun' ></author>
<author initials='H.' surname='Jung' fullname='H. Jung' ></author>
<date month='September' year='2015' />
</front>
<seriesInfo name='ACM ICN' value='' />
</reference>
<reference anchor='Ravindran'>
<front>
<title>Forwarding-Label support in CCN Protocol </title>
<author initials='' surname='Ravindran, R. et al.' fullname='R. Ravindran et
al' ></author>
<date month='March' year='2018' />
</front>
<seriesInfo name='draft-ravi-icnrg-ccn-forwarding-label-02' value='' />
</reference>
<reference anchor='Afanasyev'> <reference anchor="Afanasyev">
<front> <front>
<title>SNAMP: Secure Namespace Mapping to Scale NDN Forwarding </title> <title>SNAMP: Secure Namespace Mapping to Scale NDN Forwarding </tit
<author initials='' surname='Afanasyev, A. et al.' fullname='A. Afanasyev et le>
al' ></author> <author initials="" surname="Afanasyev, A. et al." fullname="A. Afan
<date month='April' year='2015' /> asyev et al."/>
</front> <date month="April" year="2015"/>
<seriesInfo name='IEEE Global Internet Symposium' value='' /> </front>
</reference> <seriesInfo name="DOI" value="10.1109/INFCOMW.2015.7179398"/>
<refcontent>2015 IEEE Conference on Computer Communications Workshops
</refcontent>
</reference>
<reference anchor='Mosko2'> <reference anchor="Mosko2" target="https://datatracker.ietf.org/meeting/
<front> interim-2016-icnrg-01/materials/slides-interim-2016-icnrg-1-7.pdf">
<title>Nameless Objects </title> <front>
<author initials='M.' surname='Mosko' fullname='M. Mosko' ></author> <title>Nameless Objects </title>
<date month='January' year='2016' /> <author initials="M." surname="Mosko" fullname="M. Mosko"/>
</front> <date month="January" year="2016"/>
<seriesInfo name='IRTF ICNRG' value='' /> </front>
</reference> <refcontent>IRTF ICNRG</refcontent>
</reference>
<reference anchor='Bayhan'> <reference anchor="Bayhan">
<front> <front>
<title>On Content Indexing for Off-Path Caching in Information-Centric Ne <title>On Content Indexing for Off-Path Caching in Information-Centr
tworks </title> ic Networks </title>
<author initials='' surname='Bayhan, S. et al.' fullname='S. Bayhan et al <author initials="" surname="Bayhan, S. et al." fullname="S. Bayhan
' ></author> et al."/>
<date month='September' year='2016' /> <date month="September" year="2016"/>
</front> </front>
<seriesInfo name='ACM ICN' value='' /> <seriesInfo name="DOI" value="10.1145/2984356.2984372"/>
</reference> <refcontent>ACM-ICN 2016</refcontent>
</reference>
<reference anchor='FLIC'> <xi:include href="https://datatracker.ietf.org/doc/bibxml3/reference.I-D.irtf-ic
<front> nrg-flic.xml"/>
<title>File-Like ICN Collection (FLIC) </title>
<author initials='' surname='Tschudin, C. et al.' fullname='C. Tschudin e
t al' ></author>
<date month='November' year='2019' />
</front>
<seriesInfo name='draft-irtf-icnrg-flic-02' value='' />
</reference>
<reference anchor='NEO'> <reference anchor="NEO">
<front> <front>
<title>A DNS-based information-centric network architecture open to multipl <title>A DNS-based information-centric network architecture open to
e protocols for transfer of data objects </title> multiple protocols for transfer of data objects </title>
<author initials='A.' surname='Eriksson' fullname='A. Eriksson' ></author> <author initials="A." surname="Eriksson" fullname="A. Eriksson"/>
<author initials='A.' surname='M. Malik' fullname='A. M. Malik' ></author> <author initials="A.M." surname="Malik" fullname="A.M. Malik"/>
<date month='' year='2018' /> <date month="February" year="2018"/>
</front> </front>
<seriesInfo name='21st Conference on Innovation in Clouds, Internet and Net <seriesInfo name="DOI" value="10.1109/ICIN.2018.8401595"/>
works and Workshops (ICIN),' value='pp. 1-8' /> <refcontent>21st Conference on Innovation in Clouds, Internet and Netw
</reference> orks and Workshops (ICIN), pp. 1-8</refcontent>
</reference>
<reference anchor='NRSarch'> <xi:include href="https://datatracker.ietf.org/doc/bibxml3/reference.I-D.irtf-ic
<front> nrg-nrsarch-considerations.xml"/>
<title>Architectural Considerations of ICN using Name Resolution Service</t
itle>
<author initials='' surname='Hong, J. et al.' fullname='J. Hong et al' ></a
uthor>
<date month='February' year='2021' />
</front>
<seriesInfo name='draft-irtf-icnrg-nrsarch-considerations-06' value='' />
</reference>
<reference anchor='RFC9064'> <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.9064.
<front> xml"/>
<title>Considerations in the development of a QoS Architecture for CCNx-lik
e ICN protocols</title>
<author initials='D.' surname='Oran' fullname='D. Oran'></author>
<date month='June' year='2021' />
</front>
<seriesInfo name='RFC9064, https://datatracker.ietf.org/doc/rfc9064/' value
='' />
</reference>
</references>
</references> </references>
<section anchor="Acknowledgments" numbered="false" toc="include">
<section anchor="Acknowledgments" title="Acknowledgements" numbered="false" <name>Acknowledgements</name>
toc="include"> <t>
The authors would like to thank <contact fullname="Dave Oran"/>, <cont
<t> act fullname="Dirk Kutscher"/>, <contact fullname="Ved Kafle"/>, <contact fullna
The authors would like to thank Dave Oran, Dirk Kutscher, Ved Kafle, me="Vincent Roca"/>, <contact fullname="Marie-Jose Montpetit"/>, <contact fullna
Vincent Roca, Marie-Jose Montpetit, Stephen Farrell, Mirja Kuhlewind, me="Stephen Farrell"/>, <contact fullname="Mirja Kühlewind"/>,
and Colin Perkins for very useful reviews, comments and improvement and <contact fullname="Colin Perkins"/> for very useful reviews, comme
on the document. nts, and improvements
</t> to the document.
</t>
</section> </section>
</back>
</back> </rfc>
</rfc> <!--
< </reference>
title>Networking named content</title> <sInfo name='IEEE Network' va
lue='vol. 30, no. 2' />
</reference>
&id.draft-winter-energy-efficient-internet;
</reference>
&i
d.draft-cheshire-edns0-owner-option;
<reference anchor='ITU'>
<front>
<title>Resolution 73 - Information and communication technologies an
d climate change</title>
<author></author>
<date month='October' year='2008' />
</front>
</reference>
<reference anchor='EPC'>
<front>
<title>The Case for Energy-Proportional Computing</title>
<author initials='L.' surname='Barroso' fullname='Luiz Andre Barroso
'></author>
<author initials='U.' surname='Holzle' fullname='Urs Holzle'></autho
r>
<date month='December' year='2007'/>
</front>
<seriesInfo name='Proc. IEEE International Conference on Network Protoco
ls (ICNP)' value=''/>
</reference>
<reference anchor='GreenSurvey'>
<front>
<title>A survey of green networking research</title>
<author initials='A.P.' surname='Bianzino' fullname='Aruna Prem Bian
zino'></author>
<author initials='C.' surname='Chaudet' fullname='Claude Chaudet'></
author>
<author initials='D.' surname='Rossi' fullname='Dario Rossi'></autho
r>
<author initials='J.-L.' surname='Rougier' fullname='Jean-Louis Roug
ier'></author> <date month='' year='2012' />
</front>
<seriesInfo name='IEEE Communications Surveys Tutorials' value='' />
</reference>
<reference anchor='EEE'>
<front>
<title>802.3az-2010</title>
<author></author>
<date month='' year='2010' />
</front>
<seriesInfo name='IEEE std' value='' />
</reference>
<reference anchor='PROXZZZY'>
<front>
<title>ProxZZZy for sleeping hosts</title>
<author></author>
<date month='June' year='2012' />
</front>
<seriesInfo name='ECMA International' value='ECMA-393' />
</reference>
<reference anchor='EEEC'>
<front>
<title>Improving the Energy Efficiency of Ethernet-Connected:
A Proposal for Proxying</title>
<author initials='B.' surname='Nordman' fullname='Bbuce Nordman'></a
uthor>
<author initials='K.' surname='Christensen' fullname='Ken Christense
n'></author>
<date month='September' year='2007' />
</front>
<seriesInfo name='Ethernet Alliance' value='' />
</reference>
<reference anchor='NCP'>
<front>
<title>A Network Connection Proxy to Enable Hosts to Sleep and Save
Energy</title>
<author initials='M.' surname='Jimeno' fullname='M. Jimeno'></author
>
<author initials='K.' surname='Christensen' fullname='K. Christensen
'></author>
<author initials='B.' surname='Nordman' fullname='B. Nordman'></autho
r>
<date month='' year='2008' />
</front>
<seriesInfo name='Proc. IEEE Internat. Performance Computing and Communi
cations Conf' value='' />
</reference>
<reference anchor='SKILL'>
<front>
<title>Skilled in the Art of Being Idle: Reducing Energy Waste in Ne
tworked Systems</title>
<author initials='S.' surname='Nedevschi' fullname='S. Nedevschi'></
author>
<author initials='J.' surname='Liu' fullname='J. Liu'></author>
<author initials='B.' surname='Nordman' fullname='B. Nord
man'></author>
<author initials='S.' surname='Ratnasamy' fullname='S. Ratnas
amy'></author>
<author initials='N.' surname='Taft' fullname='N. Taft'><
/author>
<date month='' year='2009' />
</front>
<seriesInfo name='Proc. USENIX Symposium on Networked Systems Design and
Implementation' value='' />
</reference>
-->
 End of changes. 173 change blocks. 
1526 lines changed or deleted 860 lines changed or added

This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/