rfc9138xml2.original.xml | rfc9138.xml | |||
---|---|---|---|---|
<?xml version="1.0" encoding="US-ASCII"?> | <?xml version="1.0" encoding="UTF-8"?> | |||
<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [ | <!DOCTYPE rfc [ | |||
<!ENTITY rfc1498 PUBLIC "" "http://xml.resource.org/public/rfc/bibxml/referenc | <!ENTITY nbsp " "> | |||
e.RFC.1498.xml"> | <!ENTITY zwsp "​"> | |||
<!ENTITY rfc2119 PUBLIC "" "http://xml.resource.org/public/rfc/bibxml/reference. | <!ENTITY nbhy "‑"> | |||
RFC.2119.xml"> | <!ENTITY wj "⁠"> | |||
<!ENTITY rfc2460 PUBLIC "" "http://xml.resource.org/public/rfc/bibxml/reference. | ||||
RFC.2460.xml"> | ||||
<!ENTITY rfc4919 PUBLIC "" "http://xml.resource.org/public/rfc/bibxml/reference. | ||||
RFC.4919.xml"> | ||||
<!ENTITY rfc4944 PUBLIC "" "http://xml.resource.org/public/rfc/bibxml/reference. | ||||
RFC.4944.xml"> | ||||
<!ENTITY rfc5826 PUBLIC "" "http://xml.resource.org/public/rfc/bibxml/reference. | ||||
RFC.5826.xml"> | ||||
<!ENTITY rfc6282 PUBLIC "" "http://xml.resource.org/public/rfc/bibxml/reference. | ||||
RFC.6282.xml"> | ||||
<!ENTITY rfc6568 PUBLIC "" "http://xml.resource.org/public/rfc/bibxml/reference. | ||||
RFC.6568.xml"> | ||||
<!ENTITY rfc6775 PUBLIC "" "http://xml.resource.org/public/rfc/bibxml/referenc | ||||
e.RFC.6775.xml"> | ||||
<!ENTITY rfc6830 PUBLIC "" "http://xml.resource.org/public/rfc/bibxml/referenc | ||||
e.RFC.6830.xml"> | ||||
<!ENTITY rfc6833 PUBLIC "" "http://xml.resource.org/public/rfc/bibxml/referenc | ||||
e.RFC.6833.xml"> | ||||
<!ENTITY rfc7252 PUBLIC "" "http://xml.resource.org/public/rfc/bibxml/referenc | ||||
e.RFC.7252.xml"> | ||||
<!ENTITY rfc7228 PUBLIC "" "http://xml.resource.org/public/rfc/bibxml/reference. | ||||
RFC.7228.xml"> | ||||
<!ENTITY rfc7428 PUBLIC "" "http://xml.resource.org/public/rfc/bibxml/reference. | ||||
RFC.7428.xml"> | ||||
<!ENTITY rfc7668 PUBLIC "" "http://xml.resource.org/public/rfc/bibxml/reference. | ||||
RFC.7668.xml"> | ||||
<!ENTITY rfc7927 PUBLIC "" "http://xml.resource.org/public/rfc/bibxml/reference. | ||||
RFC.7927.xml"> | ||||
]> | ]> | |||
<rfc category="info" docName="draft-irtf-icnrg-nrs-requirements-06" ipr="trust20 | <rfc xmlns:xi="http://www.w3.org/2001/XInclude" docName="draft-irtf-icnrg-nrs-re | |||
0902"> | quirements-06" number="9138" ipr="trust200902" obsoletes="" updates="" submissio | |||
nType="IRTF" category="info" consensus="true" xml:lang="en" tocInclude="true" to | ||||
<?xml-stylesheet type='text/xsl' href='rfc2629.xslt' ?> | cDepth="4" symRefs="true" sortRefs="true" version="3"> | |||
<!-- used by XSLT processors --> | ||||
<!-- For a complete list and description of processing instructions (PIs), | ||||
please see http://xml.resource.org/authoring/README.html. --> | ||||
<!-- Below are generally applicable Processing Instructions (PIs) that most I- | ||||
Ds might want to use. | ||||
(Here they are set differently than their defaults in xml2rfc v1.32) --> | ||||
<?rfc strict="yes" ?> | ||||
<!-- give errors regarding ID-nits and DTD validation --> | ||||
<!-- control the table of contents (ToC) --> | ||||
<?rfc toc="yes"?> | ||||
<!-- generate a ToC --> | ||||
<?rfc tocdepth="4"?> | ||||
<!-- the number of levels of subsections in ToC. default: 3 --> | ||||
<!-- control references --> | ||||
<?rfc symrefs="yes"?> | ||||
<!-- use symbolic references tags, i.e, [RFC2119] instead of [1] --> | ||||
<?rfc sortrefs="no" ?> | ||||
<!-- sort the reference entries alphabetically --> | ||||
<!-- control vertical white space | ||||
(using these PIs as follows is recommended by the RFC Editor) --> | ||||
<?rfc compact="no" ?> | ||||
<!-- do not start each<ul><li></li></ul><ul><li></li></ul> main section on a n | ||||
ew page --> | ||||
<?rfc subcompact="no" ?> | ||||
<!-- keep one blank line between list items --> | ||||
<!-- end of list of popular I-D processing instructions --> | ||||
<!-- ***** FRONT MATTER ***** --> | <!-- xml2rfc v2v3 conversion 3.9.1 --> | |||
<front> | <front> | |||
<!-- The abbreviated title is used in the page header - it is only necessa | <title abbrev="Design Considerations for NRS">Design Considerations for Name | |||
ry if the | Resolution Service in Information-Centric Networking (ICN)</title> | |||
full title is longer than 39 characters --> | <seriesInfo name="RFC" value="9138"/> | |||
<title abbrev="Design Considerations for NRS">Design Considerations for Name | ||||
Resolution Service in ICN</title> | ||||
<!-- add 'role="editor"' below for the editors if appropriate --> | ||||
<!-- Another author who claims to be an editor --> | ||||
<author fullname="Jungha Hong" initials="J." surname="Hong"> | <author fullname="Jungha Hong" initials="J." surname="Hong"> | |||
<organization>ETRI</organization> | <organization>ETRI</organization> | |||
<address> | ||||
<address> | <postal> | |||
<postal> | <extaddr>Yuseung-Gu</extaddr> | |||
<street>218 Gajeong-ro, Yuseung-Gu</street> | <street>218 Gajeong-ro</street> | |||
<!-- Reorder these if your country does things differently --> | <city>Daejeon</city> | |||
<city>Daejeon</city> | <code>34129</code> | |||
<region></region> | <country>Republic of Korea</country> | |||
<code>34129</code> | </postal> | |||
<country>Korea</country> | <email>jhong@etri.re.kr</email> | |||
</postal> | ||||
<phone></phone> | ||||
<email>jhong@etri.re.kr</email> | ||||
<!-- uri and facsimile elements may also be added --> | ||||
</address> | </address> | |||
</author> | </author> | |||
<author fullname="Tae-Wan You" initials="T." surname="You"> | <author fullname="Tae-Wan You" initials="T." surname="You"> | |||
<organization>ETRI</organization> | <organization>ETRI</organization> | |||
<address> | ||||
<address> | <postal> | |||
<postal> | <extaddr>Yuseung-Gu</extaddr> | |||
<street>218 Gajeong-ro, Yuseung-Gu</street> | <street>218 Gajeong-ro</street> | |||
<!-- Reorder these if your country does things differently --> | <city>Daejeon</city> | |||
<city>Daejeon</city> | <code>34129</code> | |||
<region></region> | <country>Republic of Korea</country> | |||
<code>34129</code> | </postal> | |||
<country>Korea</country> | <email>twyou@etri.re.kr</email> | |||
</postal> | ||||
<phone></phone> | ||||
<email>twyou@etri.re.kr</email> | ||||
<!-- uri and facsimile elements may also be added --> | ||||
</address> | </address> | |||
</author> | </author> | |||
<author fullname="Lijun Dong" initials="L." surname="Dong"> | <author fullname="Lijun Dong" initials="L." surname="Dong"> | |||
<organization>Futurewei Technologies Inc.</organization> | <organization>Futurewei Technologies Inc.</organization> | |||
<address> | ||||
<address> | <postal> | |||
<postal> | <street>10180 Telesis Court</street> | |||
<street>10180 Telesis Court</street> | <city>San Diego</city> | |||
<!-- Reorder these if your country does things differently --> | <region>CA</region> | |||
<city>San Diego</city> | <code>92121</code> | |||
<region>CA</region> | <country>United States of America</country> | |||
<code>92121</code> | </postal> | |||
<country>USA</country> | <email>lijun.dong@futurewei.com</email> | |||
</postal> | ||||
<phone></phone> | ||||
<email>lijun.dong@futurewei.com</email> | ||||
<!-- uri and facsimile elements may also be added --> | ||||
</address> | </address> | |||
</author> | </author> | |||
<author fullname="Cedric Westphal" initials="C." surname="Westphal"> | ||||
<author fullname="Cedric Westphal" initials="C." surname="Westphal"> | <organization>Futurewei Technologies Inc.</organization> | |||
<organization>Futurewei Technologies Inc.</organization> | <address> | |||
<postal> | ||||
<address> | <street>2330 Central Expressway</street> | |||
<postal> | <city>Santa Clara</city> | |||
<street>2330 Central Expressway</street> | <region>CA</region> | |||
<!-- Reorder these if your country does things differently --> | <code>95050</code> | |||
<city>Santa Clara</city> | <country>United States of America</country> | |||
<region>CA</region> | </postal> | |||
<code>95050</code> | <email>cedric.westphal@futurewei.com</email> | |||
<country>USA</country> | ||||
</postal> | ||||
<phone></phone> | ||||
<email>cedric.westphal@futurewei.com</email> | ||||
<!-- uri and facsimile elements may also be added --> | ||||
</address> | </address> | |||
</author> | </author> | |||
<author fullname="Börje Ohlman" initials="B." surname="Ohlman"> | ||||
<author fullname="Borje Ohlman" initials="B." surname="Ohlman"> | <organization abbrev="Ericsson">Ericsson Research</organization> | |||
<organization abbrev="Ericsson">Ericsson Research</organization> | <address> | |||
<postal> | ||||
<address> | <city>Stockholm</city> | |||
<postal> | <code>16480</code> | |||
<street>S-16480 Stockholm</street> | <country>Sweden</country> | |||
<!-- Reorder these if your country does things differently --> | </postal> | |||
<city></city> | <email>Borje.Ohlman@ericsson.com</email> | |||
<region></region> | ||||
<code></code> | ||||
<country>Sweden</country> | ||||
</postal> | ||||
<phone></phone> | ||||
<email>Borje.Ohlman@ericsson.com</email> | ||||
<!-- uri and facsimile elements may also be added --> | ||||
</address> | </address> | |||
</author> | </author> | |||
<date month="November" year="2021"/> | ||||
<date day="28" month="July" year="2021" /> | ||||
<!-- If the month and year are both specified and are the current ones, xml2 | ||||
rfc will fill | ||||
in the current day for you. If only the current year is specified, xml2rfc | ||||
will fill | ||||
in the current day and month for you. If the year is not the current one | ||||
, it is | ||||
necessary to specify at least a month (xml2rfc assumes day="1" if not sp | ||||
ecified for the | ||||
purpose of calculating the expiry date). With drafts it is normally suf | ||||
ficient to | ||||
specify just the year. --> | ||||
<!-- Meta-data Declarations --> | ||||
<area>ICNRG</area> | <area>ICNRG</area> | |||
<workgroup>Information-Centric Networking</workgroup> | ||||
<workgroup>ICN Research Group</workgroup> | ||||
<!-- WG name at the upperleft corner of the doc, | ||||
IETF is fine for individual submissions. | ||||
If this element is not present, the default is "Network Working Group", | ||||
which is used by the RFC Editor as a nod to the history of the IETF. --> | ||||
<keyword>Internet Draft</keyword> | ||||
<!-- Keywords will be incorporated into HTML output | ||||
files in a meta tag but they have no effect on text or nroff | ||||
output. If you submit your draft to the RFC Editor, the | ||||
keywords will be used for the search engine. --> | ||||
<abstract> | <abstract> | |||
<t> | <t> | |||
This document provides the functionalities and design considerations | This document provides the functionalities and design considerations | |||
for a Name Resolution Service (NRS) in ICN. An NRS in ICN is to transla | for a Name Resolution Service (NRS) in Information-Centric Networking (I | |||
te | CN). | |||
The purpose of an NRS in ICN is to translate | ||||
an object name into some other information such as a locator, another | an object name into some other information such as a locator, another | |||
name, etc. for forwarding the object request. This document is a product | name, etc. in order to forward the object request. This document is a pr oduct | |||
of the Information-Centric Networking Research Group (ICNRG). | of the Information-Centric Networking Research Group (ICNRG). | |||
</t> | </t> | |||
</abstract> | </abstract> | |||
</front> | ||||
</front> | ||||
<middle> | <middle> | |||
<section numbered="true" toc="default"> | ||||
<section title="Introduction"> | <name>Introduction</name> | |||
<t> | ||||
<t> | ||||
The current Internet is based upon a host-centric networking paradigm, where hosts are | The current Internet is based upon a host-centric networking paradigm, where hosts are | |||
identified with IP addresses and communication is possible | identified with IP addresses and communication is possible | |||
between any pair of hosts. Thus, information in the current Internet | between any pair of hosts. Thus, information in the current Internet | |||
is identified by the name of the host (or server) where information is stored. | is identified by the name of the host (or server) where the informatio n is stored. | |||
In contrast to host-centric networking, the primary communication | In contrast to host-centric networking, the primary communication | |||
objects in Information-centric networking (ICN) are the named data | objects in Information-Centric Networking (ICN) are the named data | |||
objects (NDOs) and they are uniquely identified by location-independen | objects (NDOs), and they are uniquely identified by location-independe | |||
t | nt | |||
names. Thus, ICN aims for the efficient dissemination and retrieval of | names. Thus, ICN aims for the efficient dissemination and retrieval of | |||
NDOs at a global scale, and has been identified and acknowledged as a | NDOs at a global scale and has been identified and acknowledged as a | |||
promising technology for a future Internet architecture to overcome | promising technology for a future Internet architecture to overcome | |||
the limitations of the current Internet such as scalability and | the limitations of the current Internet, such as scalability and | |||
mobility <xref target="Ahlgren"></xref> <xref target="Xylomenos"></xre | mobility <xref target="Ahlgren" format="default"/> <xref target="Xylom | |||
f>. | enos" format="default"/>. | |||
ICN also has emerged as a candidate architecture in the IoT environmen | ICN also has emerged as a candidate architecture in the Internet of Th | |||
t | ings (IoT) environment | |||
since IoT focuses on data and information | since IoT focuses on data and information | |||
<xref target="Baccelli"></xref> <xref target="Amadeo"></xref> <xref ta | <xref target="Baccelli" format="default"/> <xref target="Amadeo" forma | |||
rget="Quevedo"></xref> | t="default"/> <xref target="Quevedo" format="default"/> | |||
<xref target="Amadeo2"></xref> <xref target="ID.Zhang2"></xref>. | <xref target="Amadeo2" format="default"/> <xref target="I-D.irtf-icnrg-i | |||
</t> | cniot" format="default"/>. | |||
</t> | ||||
<t>Since naming data independently from its current location (where it i | <t>Since naming data independently from its current location (where it is | |||
s | ||||
stored) is a primary concept of ICN, how to find any NDO using a | stored) is a primary concept of ICN, how to find any NDO using a | |||
location-independent name is one of the most important design challeng es | location-independent name is one of the most important design challeng es | |||
in ICN. Such ICN routing may comprise three steps <xref target="RFC792 | in ICN. Such ICN routing may comprise three steps <xref target="RFC792 | |||
7"></xref>: | 7" format="default"/>: | |||
</t> | </t> | |||
<t> | ||||
<list style="symbols"> | ||||
<t>Name resolutio | ||||
n: matches/translates a content name to the locator | ||||
of content producer or source that can provide the content. </ | ||||
t> | ||||
<t>Content reques | ||||
t routing: routes the content request towards | ||||
the content's location either based on its name or locator. </ | ||||
t> | ||||
<t>Content delive | ||||
ry: transfers the content to the requester. </t> | ||||
</list> | ||||
</t> | ||||
<t> | <ol type="(%d)" spacing="normal"> | |||
<li>Name resolution: matches/translates a content name to the locator | ||||
of the content producer or source that can provide the content | ||||
. </li> | ||||
<li>Content request routing: routes the content request towards | ||||
the content's location based either on its name or locator. </ | ||||
li> | ||||
<li>Content delivery: transfers the content to the requester. </li> | ||||
</ol> | ||||
<t> | ||||
Among the three steps of ICN routing, this document investigates only | Among the three steps of ICN routing, this document investigates only | |||
the name resolution step which translates a content name to the conten t locator. | the name resolution step, which translates a content name to the conte nt locator. | |||
In addition, this document covers various possible types of name | In addition, this document covers various possible types of name | |||
resolution in ICN such as one name to another name, name to locator, | resolution in ICN such as one name to another name, name to locator, | |||
name to manifest, name to metadata, etc. | name to manifest, name to metadata, etc. | |||
</t> | </t> | |||
<t> | ||||
<t> | ||||
The focus of this document is a Name Resolution Service (NRS) itself | The focus of this document is a Name Resolution Service (NRS) itself | |||
as a service or a system in ICN and it provides the functionalities an d | as a service or a system in ICN, and it provides the functionalities a nd | |||
the design considerations for an NRS in ICN as well as the overview of | the design considerations for an NRS in ICN as well as the overview of | |||
the NRS approaches in ICN. On the other hand, its companion document | the NRS approaches in ICN. On the other hand, its companion document | |||
<xref target="NRSarch"></xref> describes considerations from the persp | <xref target="I-D.irtf-icnrg-nrsarch-considerations" format="default"/ | |||
ective | > describes considerations from the perspective | |||
of ICN architecture and routing system when using an NRS in ICN. | of the ICN architecture and routing system when using an NRS in ICN. | |||
</t> | </t> | |||
<t> | ||||
<t> | ||||
This document represents the consensus of the Information-Centric | This document represents the consensus of the Information-Centric | |||
Networking Research Group (ICNRG). It has been reviewed extensively | Networking Research Group (ICNRG). It has been reviewed extensively | |||
by the Research Group (RG) members who are actively involved in the | by the Research Group (RG) members who are actively involved in the | |||
research and development of the technology covered by this document. | research and development of the technology covered by this document. | |||
It is not an IETF product and is not a standard. | It is not an IETF product and is not a standard. | |||
</t> | </t> | |||
</section> | ||||
<!-- | ||||
<section title="Conventions and Terminology"> | ||||
<t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SH | ||||
OULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are t | ||||
o be interpreted as described in <xref target="RFC2119"></xref>.</t> | ||||
</section> | </section> | |||
<section title="Name Resolution Service in ICN"> | <section numbered="true" toc="default"> | |||
<name>Name Resolution Service in ICN</name> | ||||
<t> | <t> | |||
A Name Resolution Service (NRS) in ICN is defined as the service that | A Name Resolution Service (NRS) in ICN is defined as the service that | |||
provides the name resolution function for translating an object name | provides the name resolution function for translating an object name | |||
into some other information such as a locator, another name, metadata, | into some other information such as a locator, another name, metadata, | |||
next hop info, etc. that is used for forwarding the object request. | next-hop info, etc. that is used for forwarding the object request. | |||
In other words, an NRS is a service that can be provided by the ICN | In other words, an NRS is a service that can be provided by the ICN | |||
infrastructure to help a consumer to reach a specific piece of informa tion | infrastructure to help a consumer reach a specific piece of informatio n | |||
(or named data object). The consumer provides an NRS with a persistent | (or named data object). The consumer provides an NRS with a persistent | |||
name and the NRS returns a name or locator (or potentially multiple | name, and the NRS returns a name or locator (or potentially multiple | |||
names and locators) that can reach a current instance of the | names and locators) that can reach a current instance of the | |||
requested object. | requested object. | |||
</t> | </t> | |||
<t> | ||||
<t> | The name resolution is a necessary process in ICN routing, although the | |||
The name resolution is a necessary process in ICN routing although the | ||||
name resolution either can be separated from the content request routin g | name resolution either can be separated from the content request routin g | |||
as an explicit process or can be integrated with the content request | as an explicit process or can be integrated with the content request | |||
routing as an implicit process. The former is referred as explicit nam | routing as an implicit process. The former is referred to as an "expli | |||
e | cit name | |||
resolution approach, the latter is referred as name-based routing appro | resolution approach", and the latter is referred to as a "name-based ro | |||
ach | uting approach" | |||
in this document. | in this document. | |||
</t> | </t> | |||
<section numbered="true" toc="default"> | ||||
<section title="Explicit name resolution approach"> | <name>Explicit Name Resolution Approach</name> | |||
<t> | ||||
<t> | ||||
An NRS could take the explicit name resolution approach to return the | An NRS could take the explicit name resolution approach to return the | |||
locators of the content to the client, which will be used by the under lying | locators of the content to the client, which will be used by the under lying | |||
network as the identifier to route the client's request to one of the | network as the identifier to route the client's request to one of the | |||
producers or to a copy of the content. There are several ICN projects | producers or to a copy of the content. There are several ICN projects | |||
that use the explicit name resolution approach such as DONA | that use the explicit name resolution approach, such as Data-Oriented | |||
<xref target="Koponen"></xref>, PURSUIT <xref target="PURSUIT"></xref> | Network Architecture (DONA) <xref target="Koponen" format="default"/>, PURSUIT | |||
, | <xref target="PURSUIT" format="default"/>, | |||
NetInf <xref target="SAIL"></xref>, MobilityFirst <xref target="MF"></ | Network of Information (NetInf) <xref target="SAIL" format="default"/> | |||
xref>, | , MobilityFirst <xref target="MF" format="default"/>, | |||
IDNet <xref target="Jung"></xref>, etc. In addition, the explicit name | IDNet <xref target="Jung" format="default"/>, etc. In addition, the ex | |||
resolution approach has been allowed for 5G control planes <xref targe | plicit name | |||
t="SA2-5GLAN"></xref>. | resolution approach has been allowed for 5G control planes <xref targe | |||
</t> | t="SA2-5GLAN" format="default"/>. | |||
</t> | ||||
</section> | </section> | |||
<section numbered="true" toc="default"> | ||||
<section title="Name-based routing approach"> | <name>Name-Based Routing Approach</name> | |||
<t>An NRS could take the name-based routing approach, which integrates | ||||
<t>An NRS could take the name-based routi | name resolution with content request message routing as in | |||
ng approach, which integrates | Named Data Networking / Content-Centric Networking (NDN/CCNx) <xref | |||
the name resolution with the content request message routing as in | target="NDN" format="default"/> <xref target="CCNx" format="default"/>. | |||
NDN <xref target="NDN"></xref>/CCNx <xref target="CCNx"></xref>. | </t> | |||
</t> | <t> | |||
In cases where the content request also specifies the reverse path, | ||||
<t> | ||||
In the case that the content request also specifies the reverse path | ||||
, | ||||
as in NDN/CCNx, the name resolution mechanism also derives the routi ng | as in NDN/CCNx, the name resolution mechanism also derives the routi ng | |||
path for the data. This adds a requirement on the name resolution | path for the data. This adds a requirement to the name resolution | |||
service to propagate request in a way that is consistent with the | service to propagate the request in a way that is consistent with th | |||
e | ||||
subsequent data forwarding. Namely, the request must select a path | subsequent data forwarding. Namely, the request must select a path | |||
for the data based upon finding a copy of the content, but also | for the data based upon finding a copy of the content but also | |||
properly delivering the data. | properly delivering the data. | |||
</t> | </t> | |||
</section> | ||||
</section> | <section numbered="true" toc="default"> | |||
<name>Hybrid Approach</name> | ||||
<section title="Hybrid approach"> | <t> | |||
<t> | ||||
An NRS could also take hybrid approach. For instance, it can attempt | An NRS could also take hybrid approach. For instance, it can attempt | |||
the name-based routing approach first. If this fails at a certain | the name-based routing approach first. If this fails at a certain | |||
router, the router can go back to the explicit name resolution appro ach. | router, the router can go back to the explicit name resolution appro ach. | |||
The hybrid NRS approach also works the other way around by performin | The hybrid NRS approach also works the other way around: first by pe | |||
g | rforming | |||
explicit name resolution first to find locators of routers. And then | explicit name resolution to find the locators of routers, then by ro | |||
it can carry out the name-based routing approach of the client's req | uting the client's request using the name-based routing approach. | |||
uest. | </t> | |||
</t> | <t> | |||
<t> | ||||
A hybrid approach would combine name resolution over a subset of | A hybrid approach would combine name resolution over a subset of | |||
routers on the path with some tunneling in between (say, across an | routers on the path with some tunneling in between (say, across an | |||
administrative domain) so that only a few of the nodes in the ICN | administrative domain) so that only a few of the nodes in the ICN | |||
network perform name resolution in the name-based routing approach. | network perform name resolution in the name-based routing approach. | |||
</t> | </t> | |||
</section> | ||||
</section> | <section numbered="true" toc="default"> | |||
<name>Comparisons of Name Resolution Approaches</name> | ||||
<section title="Comparisons of name resolution approaches | <t> | |||
"> | ||||
<t> | ||||
The following compares the explicit name resolution and the name-base d | The following compares the explicit name resolution and the name-base d | |||
routing approaches for several aspects: | routing approaches in several aspects: | |||
</t> | </t> | |||
<ul spacing="normal"> | ||||
<t> | <li>Overhead due to the maintenance of the content location: | |||
<list style="symbols"> | ||||
<t>Overhead due t | ||||
o the maintenance of the content location: | ||||
The content reachability is dynamic and includes new | The content reachability is dynamic and includes new | |||
content being cached or content being expired from a cache, | content being cached or content being expired from a cache, | |||
content producer mobility, etc. Maintaining a consistent | content producer mobility, etc. Maintaining a consistent | |||
view of the content location across the network requires | view of the content location across the network requires | |||
some overhead that differs for the name resolution approaches. | some overhead that differs for the name resolution approaches. | |||
The name-based routing approach may require flooding | The name-based routing approach may require flooding | |||
parts of the network for update propagation. In the worst | parts of the network for update propagation. In the worst | |||
case, the name-based routing approach may flood the whole netw ork | case, the name-based routing approach may flood the whole netw ork | |||
(but mitigating techniques may be used to scope the flooding). | (but mitigating techniques may be used to scope the flooding). | |||
However, the explicit name resolution approach only requires | However, the explicit name resolution approach only requires | |||
updating propagation in part of the name resolution system | updating propagation in part of the name resolution system | |||
(which could be an overlay with a limited number of nodes). </ | (which could be an overlay with a limited number of nodes). </ | |||
t> | li> | |||
<t>Resolution cap | <li>Resolution capability: The explicit name resolution approach, if d | |||
ability: The explicit name resolution approach, if designed and deployed with su | esigned and deployed with sufficient robustness, can offer at least weak guarant | |||
fficient robustness, can offer at least weak guarantees that resolution will suc | ees that resolution will succeed for any content name in the network if it is re | |||
ceed for any content name in the network if it is registered to the name resolut | gistered to the name resolution overlay. | |||
ion overlay. | In the name-based routing approach, content resolution depends | |||
In the name-based routing approach, content resolution depends | on the flooding scope of the content names (i.e., content publishing message an | |||
on the flooding scope of the content names (i.e. content publishing message and | d the resulting name-based routing tables). | |||
the resulting name-based routing tables). | For example, when content is cached, the router may only notif | |||
For example, when a content is cached, the router may only not | y its direct neighbors of this information. Thus, only those neighboring | |||
ify this information to its direct neighbors. Thus, only those neighboring route | routers can build a name-based entry for this cached content. | |||
rs can build a named based entry for this cached content. | But if the neighboring routers continue to propagate this info | |||
But if the neighboring routers continue to propagate this info | rmation, the other nodes are able to direct to this cached copy as well. </li> | |||
rmation, the other nodes are able to direct to this cached copy as well. </t> | ||||
<t>Node failure i | ||||
mpact: Nodes involved in the explicit name resolution approach are the name reso | ||||
lution overlay servers (e.g. Resolution Handlers in DONA), | ||||
while the nodes involved in the name-based routing approach ar | ||||
e routers which route messages based on the name-based routing tables (e.g. NDN | ||||
routers). | ||||
Node failures in the explicit name resolution approach may cau | ||||
se some content request routing to fail even though the content is available. | ||||
This problem does not exist in the name-based routing approach | ||||
because other alternative paths can be discovered to bypass the failed ICN rout | ||||
ers, given the assumption that the network is still connected.</t> | ||||
<t>Maintained dat | ||||
abases: The storage usage for the explicit name resolution approach is different | ||||
from that of the name-based routing approach. | ||||
The explicit name resolution approach typically needs to maint | ||||
ain two databases: name to locator mapping in the name resolution overlay and ro | ||||
uting tables in the routers on the data forwarding plane. | ||||
The name-based routing approach needs to maintain only the na | ||||
me-based routing tables.</t> | ||||
</list> | ||||
</t> | ||||
<t>Additionally, some other intermediary step may be included in the nam | ||||
e resolution, namely the mapping of one name to other names, in order to facilit | ||||
ate the retrieval of named content, by way of a manifest <xref target="Westphal" | ||||
></xref> <xref target="Mosko"></xref>. | ||||
The manifest is resolved using one of the two above approaches, and it m | ||||
ay include further mapping of names to content and location. The steps for name | ||||
resolution then become: first translate the manifest name into a location of a c | ||||
opy of the manifest; the manifest includes further names of the content componen | ||||
ts, and potentially locations for the content. | ||||
The content is then retrieved by using these names and/or location, pote | ||||
ntially resulting in additional name resolutions. </t> | ||||
<li>Node failure impact: Nodes involved in the explicit name resolutio | ||||
n approach are the name resolution overlay servers (e.g., resolution handlers in | ||||
DONA), | ||||
while the nodes involved in the name-based routing approach ar | ||||
e routers that route messages based on the name-based routing tables (e.g., NDN | ||||
routers). | ||||
Node failures in the explicit name resolution approach may cau | ||||
se some content request routing to fail even though the content is available. | ||||
This problem does not exist in the name-based routing approach | ||||
because other alternative paths can be discovered to bypass the failed ICN rout | ||||
ers, given the assumption that the network is still connected.</li> | ||||
<li>Maintained databases: The storage usage for the explicit name reso | ||||
lution approach is different from that of the name-based routing approach. | ||||
The explicit name resolution approach typically needs to maint | ||||
ain two databases: name-to-locator mapping in the name resolution overlay and ro | ||||
uting tables in the routers on the data forwarding plane. | ||||
The name-based routing approach needs to maintain only the na | ||||
me-based routing tables.</li> | ||||
</ul> | ||||
<t>Additionally, some other intermediary step may be included in the nam | ||||
e resolution -- namely, the mapping of one name to other names -- in order to fa | ||||
cilitate the retrieval of named content by way of a manifest <xref target="Westp | ||||
hal" format="default"/> <xref target="RFC8569" format="default"/>. | ||||
The manifest is resolved using one of the two above approaches, and it m | ||||
ay include further mapping of names to content and location. | ||||
The steps for name resolution then become the following: first, translate the ma | ||||
nifest name into a location of a copy of the manifest, which includes further na | ||||
mes of the content components and potentially locations for the content, then re | ||||
trieve the content by using these names and/or location, potentially resulting i | ||||
n additional name resolutions. </t> | ||||
<t>Thus, no matter which approach is taken by an NRS in ICN, the name re solution is the essential function that shall be provided by the ICN infrastruct ure. </t> | <t>Thus, no matter which approach is taken by an NRS in ICN, the name re solution is the essential function that shall be provided by the ICN infrastruct ure. </t> | |||
</section> | ||||
</section> | </section> | |||
<section numbered="true" toc="default"> | ||||
</section> | <name>Functionalities of NRS in ICN</name> | |||
<t>This section presents the functionalities of an NRS in ICN. </t> | ||||
<section title="Functionalities of NRS in ICN"> | <section numbered="true" toc="default"> | |||
<t>This section presents the functionalities of an NRS in ICN. </t> | <name>Support Heterogeneous Name Types</name> | |||
<t> | ||||
<section title="Support heterogeneous name types"> | In ICN, a name is used to identify the data object and is bound to it | |||
<t> | <xref target="RFC7927" format="default"/>. | |||
In ICN, a name is used to identify data object and is bound to it <xre | ICN requires uniqueness and persistency of the name of the data object | |||
f target="RFC7927"></xref>. | to ensure the | |||
ICN requires uniqueness and persistency of the name of data object to | ||||
ensure the | ||||
reachability of the object within a certain scope. There are | reachability of the object within a certain scope. There are | |||
heterogeneous approaches to designing ICN naming schemes <xref target= "Bari"></xref>. | heterogeneous approaches to designing ICN naming schemes <xref target= "Bari" format="default"/>. | |||
Ideally, a name can include any form of identifier, which can be | Ideally, a name can include any form of identifier, which can be | |||
flat or hierarchical, and human readable or non-readable. | flat or hierarchical, human readable or non-readable. | |||
</t> | </t> | |||
<t> | <t> | |||
Although there are diverse types of naming schemes proposed in literat | Although there are diverse types of naming schemes proposed in the lit | |||
ure, | erature, | |||
they all need to provide basic functions for identifying data object, | they all need to provide basic functions for identifying a data object | |||
supporting named data lookup and routing. An NRS may combine the bette | , | |||
r | supporting named data lookup, and routing. An NRS may combine the bett | |||
er | ||||
aspects of different schemes. Basically, an NRS should be able to supp ort | aspects of different schemes. Basically, an NRS should be able to supp ort | |||
a generic naming schema so that it can resolve any type of content nam e, | a generic naming schema so that it can resolve any type of content nam e, | |||
irrespective of whether it is flat, hierarchical, attribute-based or | irrespective of whether it is flat, hierarchical, attribute based, or | |||
anything else. | anything else. | |||
</t> | </t> | |||
<t> | <t> | |||
In PURSUIT <xref target="PURSUIT"></xref>, names are flat and the rend | In PURSUIT <xref target="PURSUIT" format="default"/>, names are flat, | |||
ezvous | and the rendezvous | |||
functions are defined for an NRS, which is implemented by a set of Ren | functions are defined for an NRS, which is implemented by a set of ren | |||
dezvous | dezvous | |||
Nodes (RNs), the Rendezvous Network (RENE). Thus, a name consists of a | nodes (RNs), known as the rendezvous network (RENE). Thus, a name cons | |||
sequence of scope IDs and a single rendezvous ID is routed by the RNs | ists of a | |||
in RENE. | sequence of scope IDs, and a single rendezvous ID is routed by the RNs | |||
in RENE. | ||||
Thus, PURSUIT decouples name resolution and data routing, where the NR S | Thus, PURSUIT decouples name resolution and data routing, where the NR S | |||
is performed by the RENE. | is performed by the RENE. | |||
</t> | </t> | |||
<t> | <t> | |||
In MobilityFirst <xref target="MF"></xref>, a name called a Global | In MobilityFirst <xref target="MF" format="default"/>, a name known as | |||
Unique IDentifier (GUID) derived from a human-readable name via a glob | a "Global | |||
al | Unique Identifier (GUID)", derived from a human-readable name via a gl | |||
naming service is a flat typed 160-bits string with self-certifying | obal | |||
naming service, is a flat typed 160-bit string with self-certifying | ||||
properties. Thus, MobilityFirst defines a Global Name Resolution Servi ce | properties. Thus, MobilityFirst defines a Global Name Resolution Servi ce | |||
(GNRS) which resolves GUIDs to network addresses and decouples name | (GNRS), which resolves GUIDs to network addresses and decouples name | |||
resolution and data routing similarly to PURSUIT. | resolution and data routing similarly to PURSUIT. | |||
</t> | </t> | |||
<t> | <t> | |||
In NetInf <xref target="Dannewitz"></xref>, information objects are na | In NetInf <xref target="Dannewitz" format="default"/>, information obj | |||
med using ni-naming <xref target="RFC6920"></xref>, which consist of an authorit | ects are named using Named Information (NI) names <xref target="RFC6920" format= | |||
y part and digest part (content hash). | "default"/>, which consist of an authority part and digest part (content hash). | |||
The ni names can be flat as the authority part is optional. Thus, the | The NI names can be flat as the authority part is optional. Thus, the | |||
NetInf architecture also includes a Name Resolution System (NRS) which can be us | NetInf architecture also includes a Name Resolution System (NRS), which can be u | |||
ed to resolve ni-names to addresses in an underlying routable network layer. | sed to resolve NI names to addresses in an underlying routable network layer. | |||
</t> | </t> | |||
<t> | <t> | |||
In NDN <xref target="NDN"></xref> and CCNx <xref target="CCNx"></xref> , | In NDN <xref target="NDN" format="default"/> and CCNx <xref target="CC Nx" format="default"/>, | |||
names are hierarchical and may be similar to URLs. Each name component | names are hierarchical and may be similar to URLs. Each name component | |||
can be anything, including a human-readable string or a hash value. | can be anything, including a human-readable string or a hash value. | |||
NDN/CCNx adopts the name-based routing approach. The NDN router forwar ds | NDN/CCNx adopts the name-based routing approach. The NDN router forwar ds | |||
the request by doing the longest-match lookup in the Forwarding | the request by doing the longest-match lookup in the Forwarding | |||
Information Base (FIB) based on the content name and the request is | Information Base (FIB) based on the content name, and the request is | |||
stored in the Pending Interest Table (PIT). | stored in the Pending Interest Table (PIT). | |||
</t> | </t> | |||
<!-- | ||||
<t> In ICN design, a name is used to identify an entity, such as named | ||||
data content, a device, an application, a service. ICN requires uniqueness and p | ||||
ersistency of the name of any entity to ensure the reachability of the entity wi | ||||
thin certain scope and with proper authentication and trust guarantees. The name | ||||
does not change with the mobility and multi-home of the corresponding entity. A | ||||
client can always use this name to retrieve the content from network and verify | ||||
the binding of the content and the name. </t> | ||||
<t>Ideally, a name can include any form of identi | ||||
fier, which can be flat, hierarchical, and human readable or non-readable. </t> | ||||
<t>There are heterogeneous content naming schemes | ||||
<xref target="ID.Zhang"></xref> <xref target="RFC1498"></xref> and name resolut | ||||
ion approaches from different ICN architectures. For example: </t> | ||||
<t> | ||||
<list style="symbols"> | ||||
<t>Names in DONA | ||||
<xref target="Koponen"></xref> consist of the cryptographic hash of the principa | ||||
l's public key P and a label L uniquely identifying the information with respect | ||||
to the principal. Name resolution in DONA is provided by specialized servers ca | ||||
lled Resolution Handlers (RHs). </t> | ||||
<t>Content in PUR | ||||
SUIT <xref target="PURSUIT"></xref> is identified by a combination of a scope ID | ||||
and a rendezvous ID. The scope ID represents the boundaries of a defined dissem | ||||
ination strategy for the content it contain. The rendezvous ID is the actual ide | ||||
ntity for a particular content. Name resolution in PURSUIT is handled by a colle | ||||
ction of Rendezvous Nodes (RNs), which are implemented as a hierarchical Dynamic | ||||
Hash Table (DHT)<xref target="Rajahalme"></xref> <xref target="Katsaros"></xref | ||||
>. </t> | ||||
<t>Names in NDN < | ||||
xref target="NDN"></xref> and CCN <xref target="CCN"></xref> are hierarchical an | ||||
d may be similar to URLs. Each name component can be anything, including a dotte | ||||
d human-readable string or a hash value. NDN/CCN adopts the name based routing. | ||||
The NDN router forwards the request by doing the longest-match lookup in the For | ||||
warding Information Base (FIB) based on the content name and the request is stor | ||||
ed in the Pending Interest Table (PIT). </t> | ||||
<t>In MobilityFir | ||||
st <xref target="MF"></xref>, every network entity, content has a Global Unique | ||||
Identifier (GUID). GUIDs are flat 160-bit strings with no semantic structure. Na | ||||
me Resolution in MobilityFirst is carried out via a Global Name Resolution Servi | ||||
ce (GNRS). </t> | ||||
</list> | ||||
</t> | ||||
<t>Although the existing naming schemes are diffe | ||||
rent, they all need to provide basic functions for identifying a content, suppor | ||||
ting trust provenance, content lookup and routing. The NRS may combine the advan | ||||
tages of different mechanisms. The NRS should be able to support a generic namin | ||||
g schema to resolve any type of content name, either it is flat or hierarchical. | ||||
</t> | ||||
</section> | </section> | |||
<section numbered="true" toc="default"> | ||||
<section title="Support producer mobility"> | <name>Support Producer Mobility</name> | |||
<t> | ||||
<t> | ICN inherently supports mobility by consumers. Namely, consumer or cl | |||
ICN natively supports mobility management. Namely, consumer or client | ient | |||
mobility is handled by re-requesting the content in case the mobility | mobility is handled by re-requesting the content in case the mobility | |||
event (say, handover) occurred before receiving the corresponding | event (say, handover) occurred before receiving the corresponding | |||
content from the network. Since ICN can ensure that content reception | content from the network. Since ICN can ensure that content reception | |||
continues without any disruption in ICN applications, seamless mobili ty | continues without any disruption in ICN applications, seamless mobili ty | |||
from the consumer's point of view can be easily supported. | from the consumer's point of view can be easily supported. | |||
</t> | </t> | |||
<t> | ||||
<t> | ||||
However, producer mobility does not emerge naturally from the ICN | However, producer mobility does not emerge naturally from the ICN | |||
forwarding model as does consumer mobility. If a producer moves into | forwarding model as does consumer mobility. If a producer moves into | |||
a different network location or a different name domain, which is | a different network location or a different name domain, which is | |||
assigned by another authoritative publisher, it would be difficult fo r | assigned by another authoritative publisher, it would be difficult fo r | |||
the mobility management to update RIB and FIB entries in ICN routers | the mobility management to update Routing Information Base (RIB) and FIB entries in ICN routers | |||
with the new forwarding path in a very short time. Therefore, various | with the new forwarding path in a very short time. Therefore, various | |||
ICN architectures in the literature have proposed to adopt an NRS to | ICN architectures in the literature have proposed adopting an NRS to | |||
achieve the producer or publisher mobility, where the NRS can be | achieve the producer or publisher mobility, where the NRS can be | |||
implemented in different ways such as rendezvous points and/or overla y mapping systems. | implemented in different ways such as rendezvous points and/or overla y mapping systems. | |||
</t> | </t> | |||
<t> | ||||
<t> | In NDN <xref target="Zhang2" format="default"/>, for producer mobilit | |||
In NDN <xref target="Zhang2"></xref>, for producer mobility support, | y support, rendezvous mechanisms have been proposed to build interest rendezvous | |||
rendezvous mechanisms have been proposed to build interests rendezvou | ||||
s | ||||
(RV) with data generated by a mobile producer (MP). This can be | (RV) with data generated by a mobile producer (MP). This can be | |||
classified into two approaches: chase mobile producer; and rendezvous data. | classified into two approaches: chase mobile producer and rendezvous data. | |||
Regarding MP chasing, rendezvous acts as a mapping service that provi des | Regarding MP chasing, rendezvous acts as a mapping service that provi des | |||
the mapping from the name of the data produced by the MP to the name | the mapping from the name of the data produced by the MP to the name | |||
of the MP's current point of attachment (PoA). Alternatively, the RV | of the MP's current point of attachment (PoA). | |||
Alternatively, the RV | ||||
serves as a home agent as in IP mobility support, so the RV enables | serves as a home agent as in IP mobility support, so the RV enables | |||
consumer's interest message to tunnel towards the MP at the PoA. | the consumer's Interest message to tunnel towards the MP at the PoA. | |||
Regarding rendezvous data, the solution involves moving the data prod uced | Regarding rendezvous data, the solution involves moving the data prod uced | |||
by the MP to a data depot instead of forwarding interest messages. Th | by the MP to a data depot instead of forwarding Interest messages. | |||
us, | ||||
a consumer's interest message can be forwarded to stationary place as | Thus, | |||
called data rendezvous, so it would either return the data or fetch i | a consumer's Interest message can be forwarded to stationary place ca | |||
t | lled a "data rendezvous", so it would either return the data or fetch it | |||
using another mapping solution. Therefore, RV or other mapping functi ons | using another mapping solution. Therefore, RV or other mapping functi ons | |||
are in the role of an NRS in NDN. | are in the role of an NRS in NDN. | |||
</t> | </t> | |||
<t> | ||||
<t> | In <xref target="I-D.ravi-icnrg-ccn-forwarding-label" format="default" | |||
In <xref target="Ravindran"></xref>, forwarding-label (FL) object is | />, the forwarding label (FL) object is | |||
referred to enable identifier (ID) and locator (LID) namespaces to be | used to enable identifier (ID) and locator (LID) namespaces to be | |||
split in ICN. Generally, IDs are managed by applications, while locato rs | split in ICN. Generally, IDs are managed by applications, while locato rs | |||
are managed by a network administrator, so that IDs are mapping to | are managed by a network administrator so that IDs are mapped to | |||
heterogeneous name schemes and LIDs are mapping to the network domains | heterogeneous name schemes and LIDs are mapped to the network domains | |||
or | or | |||
to specific network elements. Thus, the proposed FL object acts as a l ocator | to specific network elements. Thus, the proposed FL object acts as a l ocator | |||
(LID) and provides the flexibility to forward Interest messages throug h | (LID) and provides the flexibility to forward Interest messages throug h | |||
mapping service between IDs and LIDs. Therefore, the mapping service i n | a mapping service between IDs and LIDs. Therefore, the mapping service in | |||
control plane infrastructure can be considered as an NRS in this draft . | control plane infrastructure can be considered as an NRS in this draft . | |||
</t> | </t> | |||
<t> | ||||
<t> | In MobilityFirst <xref target="MF" format="default"/>, both consumer a | |||
In MobilityFirst <xref target="MF"></xref>, both consumer and publishe | nd publisher | |||
r | ||||
mobility can be primarily handled by the global name resolution servic e | mobility can be primarily handled by the global name resolution servic e | |||
(GNRS) which resolves GUIDs to network addresses. Thus, the GNRS must | (GNRS), which resolves GUIDs to network addresses. Thus, the GNRS mus | |||
be updated for mobility support when a network attached object changes | t | |||
be updated for mobility support when a network-attached object changes | ||||
its point of attachment, which differs from NDN/CCNx. | its point of attachment, which differs from NDN/CCNx. | |||
</t> | </t> | |||
<t> | <t> | |||
In NetInf <xref target="Dannewitz"></xref>, mobility is handled by | In NetInf <xref target="Dannewitz" format="default"/>, mobility is han dled by | |||
an NRS in a very similar way to MobilityFirst. | an NRS in a very similar way to MobilityFirst. | |||
</t> | </t> | |||
<t> | ||||
<t> | Besides the consumer and producer mobility, ICN also faces | |||
Besides the consumer and producer mobility, ICN also has to face | ||||
challenges to support the other dynamic features such as multi-homing , | challenges to support the other dynamic features such as multi-homing , | |||
migration, and replication of named resources such as content, device s, | migration, and replication of named resources such as content, device s, | |||
and services. Therefore, an NRS can help to support these dynamic fea tures. | and services. Therefore, an NRS can help to support these dynamic fea tures. | |||
</t> | </t> | |||
<!-- | ||||
<t>In ICN literature, it is said that mobility can be achieved in fundam | ||||
ental feature of ICN. Especially, consumer or client mobility can be achieved by | ||||
requesting information again according to the basic procedure from different in | ||||
terfaces or through attachment point of the new network. Moreover, seamless mobi | ||||
lity service in ICN ensures that content reception continues without any disrupt | ||||
ion in ICN application, so in consumer point of view, seamless mobility can be e | ||||
asily supported. </t> | ||||
<t>However, producer or publisher mobility in ICN | ||||
is more complicated to be supported. If a producer moves into different authori | ||||
ty domain or network location, then the request for a content published by the m | ||||
oving puroducer with origin name would be hardly forwarded to the moving produce | ||||
r since the routing tables related in broad area should be updated according to | ||||
the producer movement. Therefore, various ICN literatures would adopt NRS to ach | ||||
ieve the producer or publisher mobility, where NRS can be implemented in differe | ||||
nt ways such as rendezvous mechanism, mapping, etc. </t> | ||||
<t>Besides mobility, ICN has challenge to support | ||||
the dynamism features like multi-homing, migration, and replication of named re | ||||
sources such as content, devices, services, etc. and NRS may help to support the | ||||
dynamism features. </t> | ||||
</section> | </section> | |||
<section numbered="true" toc="default"> | ||||
<section title="Support scalable routing system"> | <name>Support Scalable Routing System</name> | |||
<t> | ||||
<t> | ||||
In ICN, the name of data objects is used for routing by either a name | In ICN, the name of data objects is used for routing by either a name | |||
resolution step or a routing table lookup. Thus, routing information | resolution step or a routing table lookup. Thus, routing information | |||
for each data object should be maintained in the routing base, such | for each data object should be maintained in the routing base, such | |||
as Routing Information Base (RIB) and Forwarding Information Base (FI B). | as RIB and FIB. | |||
Since the number of data objects would be very large, the size of | Since the number of data objects would be very large, the size of | |||
information bases would be significantly larger as well <xref target= | information bases would be significantly larger as well <xref target= | |||
"RFC7927"></xref>. | "RFC7927" format="default"/>. | |||
</t> | </t> | |||
<t> | ||||
<t> | The hierarchical namespace used in CCNx <xref target="CCNx" format="d | |||
The hierarchical namespace used in CCNx <xref target="CCNx"></xref> | efault"/> | |||
and NDN <xref target="NDN"></xref> architectures reduces the size of | and NDN <xref target="NDN" format="default"/> architectures reduces t | |||
he size of | ||||
these tables through name aggregation and improves the scalability of | these tables through name aggregation and improves the scalability of | |||
the routing system. A flat naming scheme, on the other hand, would | the routing system. A flat naming scheme, on the other hand, would | |||
aggravate the scalability problem of the routing system. | aggravate the scalability problem of the routing system. | |||
The non-aggregated name prefixes injected to the Default Route Free | The non-aggregated name prefixes injected into the Default Route Free | |||
Zone (DFZ) of ICN would create more serious scalability problem when | Zone (DFZ) of ICN would create a more serious scalability problem whe | |||
n | ||||
compared to the scalability issues of the IP routing system. | compared to the scalability issues of the IP routing system. | |||
Thus, an NRS may play an important role in the reduction of the routi ng | Thus, an NRS may play an important role in the reduction of the routi ng | |||
scalability problem regardless of the types of namespaces. | scalability problem regardless of the types of namespaces. | |||
</t> | </t> | |||
<t> | ||||
<t> | In <xref target="Afanasyev" format="default"/>, in order to address t | |||
In <xref target="Afanasyev"></xref>, in order to address the routing | he routing | |||
scalability problem in NDN's DFZ, a well-known concept of Map-and-En | scalability problem in NDN's DFZ, a well-known concept called "map-an | |||
cap | d-encap" is applied to provide a simple and secure namespace mapping solution. | |||
is applied to provide a simple and secure namespace mapping solution. | ||||
In the proposed map-and-encap design, data whose name prefixes do not | In the proposed map-and-encap design, data whose name prefixes do not | |||
exist in the DFZ forwarding table can be retrieved by a distributed | exist in the DFZ forwarding table can be retrieved by a distributed | |||
mapping system called NDNS, which maintains and lookups the mapping | mapping system called NDNS, which maintains and looks up the mapping | |||
information from a name to its globally routed prefixes, where NDNS i s | information from a name to its globally routed prefixes, where NDNS i s | |||
a kind of an NRS. | a kind of an NRS. | |||
</t> | </t> | |||
<!-- | ||||
<t>In ICN, data objects must be identified by names regardless their lo | ||||
cation or container <xref target="RFC7927"></xref> and the names are divided int | ||||
o two types of schemes: hierarchical and flat namespaces. A hierarchical scheme | ||||
used in CCN and NDN architectures has a structure similar to current URIs, where | ||||
the hierarchy improves scalability of routing system. It is because the hierarc | ||||
hy enables aggregation of the name resulting in reducing the size of RIB or FIB | ||||
as similar to IP routing system. In a flat scheme, on the other hand, name routi | ||||
ng is not easy since names in a flat namespace cannot be aggregated anymore, whi | ||||
ch would cause more the scalability problem in routing system. In order to addre | ||||
ss such problem, a flat name can be resolved to some information which is routab | ||||
le through NRS. </t> | ||||
<t>In ICN, application names identifying contents are used directl | ||||
y for packet delivery, so ICN routers run a name-based routing protocol to build | ||||
name-based routing and forwarding tables. Regardless of name scheme, if non-agg | ||||
regated name prefixes are injected to the Default Route Free Zone (DFZ) of ICN, | ||||
then they would be driving the growth of the DFZ routing table size, which is th | ||||
e same as the scalability issue of IP routing. Thus a solution to keep the routi | ||||
ng table size under control is needed, which can be done by defining indirection | ||||
layer. </t> | ||||
</section> | </section> | |||
<section numbered="true" toc="default"> | ||||
<section title="Support off-path caching"> | <name>Support Off-Path Caching</name> | |||
<t> | <t> | |||
Caching in-network is considered to be a basic architectural component | Caching in-network is considered to be a basic architectural component | |||
of an ICN architecture. It may be used to provide a level of Quality-o | of an ICN architecture. It may be used to provide a level of quality-o | |||
f-Service (QoS) | f-service (QoS) | |||
experience to users, to reduce the overall network traffic, to prevent | experience to users to reduce the overall network traffic, to prevent | |||
network | network | |||
congestion and Denial-of-Service (DoS) attacks and to increase availab | congestion and denial-of-service (DoS) attacks, and to increase availa | |||
ility. | bility. | |||
Caching approaches can be categorized into off-path caching and on-pat h | Caching approaches can be categorized into off-path caching and on-pat h | |||
caching based on the location of caches in relation to the forwarding | caching based on the location of caches in relation to the forwarding | |||
path from the original server to the consumer. Off-path caching, also | path from the original server to the consumer. Off-path caching, also | |||
referred as content replication or content storing, aims to replicate | referred to as "content replication" or "content storing", aims to rep licate | |||
content within a network in order to increase availability, regardless of | content within a network in order to increase availability, regardless of | |||
the relationship of the location to the forwarding path. Thus, finding | the relationship of the location to the forwarding path. Thus, finding | |||
off-path cached objects is not trivial in name-based routing of ICN. | off-path cached objects is not trivial in name-based routing of ICN. | |||
In order to support off-path caches, replicas are usually advertised | In order to support off-path caches, replicas are usually advertised | |||
into a name-based routing system or into an NRS. | into a name-based routing system or into an NRS. | |||
</t> | </t> | |||
<t> | ||||
<t> | In <xref target="Bayhan" format="default"/>, an NRS is used to find of | |||
In <xref target="Bayhan"></xref>, an NRS is used to find off-path copi | f-path copies | |||
es | ||||
in the network, which may not be accessible via name-based routing mec hanisms. | in the network, which may not be accessible via name-based routing mec hanisms. | |||
Such capability can be helpful for an Autonomous System (AS) to avoid | Such a capability can be helpful for an Autonomous System (AS) to avoi d | |||
the costly inter-AS traffic for external content more, to yield higher | the costly inter-AS traffic for external content more, to yield higher | |||
bandwidth efficiency for intra-AS traffic, and to decrease the data | bandwidth efficiency for intra-AS traffic, and to decrease the data | |||
access latency for a pleasant user experience. | access latency for a pleasant user experience. | |||
</t> | ||||
</section> | ||||
<section title="Support nameless object"> | ||||
<t> | ||||
In CCNx 1.0 <xref target="Mosko2"></xref>, the concept of "Nameless | ||||
Objects" that are a Content Object without a Name is introduced to | ||||
provide a means to move Content between storage replicas without havin | ||||
g | ||||
to rename or re-sign the content objects for the new name. Nameless | ||||
Objects can be addressed by the ContentObjectHash that is to restrict | ||||
Content Object matching by using SHA-256 hash. | ||||
</t> | </t> | |||
</section> | ||||
<t> | <section numbered="true" toc="default"> | |||
An Interest message would still carry a Name and a ContentObjectHash, | <name>Support Nameless Object</name> | |||
where a Name is used for routing, while a ContentObjectHash is used | <t> | |||
In CCNx 1.0 <xref target="Mosko2" format="default"/>, the concept of a | ||||
"Nameless | ||||
Object", which is a Content Object without a name, is introduced to | ||||
provide a means to move content between storage replicas without havin | ||||
g | ||||
to rename or re-sign the Content Objects for the new name. Nameless | ||||
Objects can be addressed by the ContentObjectHash, which is to restric | ||||
t | ||||
Content Object matching by using a SHA-256 hash. | ||||
</t> | ||||
<t> | ||||
An Interest message would still carry a name and a ContentObjectHash, | ||||
where a name is used for routing, while a ContentObjectHash is used | ||||
for matching. However, on the reverse path, if the Content Object's | for matching. However, on the reverse path, if the Content Object's | |||
name is missing, it is a "Nameless Object" and only matches against th e | name is missing, it is a "Nameless Object" and only matches against th e | |||
ContentObjectHash. Therefore, a consumer needs to resolve proper name | ContentObjectHash. Therefore, a consumer needs to resolve the proper n ame | |||
and hashes through an outside system, which can be considered as an NR S. | and hashes through an outside system, which can be considered as an NR S. | |||
</t> | </t> | |||
</section> | ||||
</section> | <section numbered="true" toc="default"> | |||
<name>Support Manifest</name> | ||||
<section title="Support manifest"> | <t> | |||
<t> | For collections of data objects that are | |||
For collections of data objects which are | organized as large and file-like contents <xref target="I-D.irtf-icnrg-flic" for | |||
organized as large and file | mat="default"/>, manifests are used as data | |||
like contents <xref target="FLIC"></xref>, manifests are used as data | ||||
structures to transport this information. Thus, manifests may contain | structures to transport this information. Thus, manifests may contain | |||
hash digests of signed content objects or other manifests, so that lar | hash digests of signed Content Objects or other manifests so that larg | |||
ge | e | |||
content objects which represent large piece of application data can be | Content Objects that represent a large piece of application data can b | |||
collected by using such manifest. | e | |||
</t> | collected by using such a manifest. | |||
</t> | ||||
<t> | <t> | |||
In order to request content objects, a co | In order to request Content Objects, a co | |||
nsumer needs to know a manifest | nsumer needs to know a manifest | |||
root name to acquire the manifest. In case of FLIC, a manifest name | root name to acquire the manifest. In the case of File-Like ICN Collec | |||
can be represented by a nameless root manifest, so that outside system | tions (FLIC), a manifest name | |||
can be represented by a nameless root manifest so that an outside syst | ||||
em | ||||
such as an NRS may be involved to give this information to the consume r. | such as an NRS may be involved to give this information to the consume r. | |||
</t> | </t> | |||
</section> | ||||
</section> | <section numbered="true" toc="default"> | |||
<name>Support Metadata</name> | ||||
<section title="Support metadata"> | <t> | |||
<t> | When resolving the name of a Content Object, NRS could return a rich | |||
When resolving the name of a content object, NRS could return a rich | ||||
set of metadata in addition to returning a locator. The metadata | set of metadata in addition to returning a locator. The metadata | |||
could include alternative object locations, supported object transfe r | could include alternative object locations, supported object transfe r | |||
protocol(s), caching policy, security parameters, data format, hash | protocol(s), caching policy, security parameters, data format, hash | |||
of object data, etc. The consumer could use this metadata for select ion | of object data, etc. The consumer could use this metadata for the se lection | |||
of object transfer protocol, security mechanism, egress interface, e tc. | of object transfer protocol, security mechanism, egress interface, e tc. | |||
An example of how metadata can be used in this way is provided by th e | An example of how metadata can be used in this way is provided by th e | |||
NEO ICN architecture <xref target="NEO"></xref>. | Networked Object (NEO) ICN architecture <xref target="NEO" format="d | |||
</t> | efault"/>. | |||
</t> | ||||
</section> | </section> | |||
</section> | ||||
</section> | <section numbered="true" toc="default"> | |||
<name>Design Considerations for NRS in ICN</name> | ||||
<section title="Design considerations for NRS in ICN"> | ||||
<t> | <t> | |||
This section presents the design considerations for NRS in ICN. | This section presents the design considerations for NRS in ICN. | |||
</t> | </t> | |||
<section numbered="true" toc="default" anchor="res-response"> | ||||
<section title="Resolution response time"> | <name>Resolution Response Time</name> | |||
<t> | <t> | |||
The name resolution process should provide a response within a reaso | The name resolution process should provide a response within a reaso | |||
nable amount of time. The response should be either a proper mapping of the name | nable amount of time. The response should be either a proper mapping of the name | |||
to a copy of the content, or an error message stating that no such object exist | to a copy of the content or an error message stating that no such object exists | |||
s. If the name resolution does not map to a location, the system may not issue a | . If the name resolution does not map to a location, the system may not issue an | |||
ny response, and the client should set a timer when sending a request, so as to | y response, and the client should set a timer when sending a request so as to co | |||
consider the resolution incomplete when the timer expires. | nsider the resolution incomplete when the timer expires. | |||
</t> | </t> | |||
<t> | <t> | |||
The acceptable response delay could be of the order of a round trip | The acceptable response delay could be of the order of a round-trip | |||
time between the client issuing the request and the NRS servers that | time between the client issuing the request and the NRS servers that | |||
provides the response. While this RTT may vary greatly depending on the proximi | provide the response. While this RTT may vary greatly depending on the proximit | |||
ty between the two end points, some upper bound need be used. | y between the two end points, some upper bound needs to be used. | |||
Especially, in some delay-sensitive scenarios such as industrial Int | Especially in some delay-sensitive scenarios such as industrial Inte | |||
ernet and telemedicine, the upper bound of the response delay must be guaranteed | rnet and telemedicine, the upper bound of the response delay must be guaranteed. | |||
. | </t> | |||
</t> | ||||
<!-- <t> | ||||
The response time should be within the same order of magnitude for m | ||||
ost pairs of a client issuing a request, and the NRS server responding to this r | ||||
equest. | ||||
</t> | ||||
--> | ||||
<t> | <t> | |||
The response time includes all the steps of the resolution, includin g potentially a hop-by-hop resolution or a hierarchical forwarding of the resolu tion request. | The response time includes all the steps of the resolution, includin g potentially a hop-by-hop resolution or a hierarchical forwarding of the resolu tion request. | |||
</t> | </t> | |||
<!-- | ||||
<t>The name resolution process provided by the NRS must be completed wi | ||||
thin a minimum delay. If the name resolution takes too long, then the content re | ||||
quest packet may get dropped or it will yield the high content retrieval time fo | ||||
r content requestor. Thus, the content retrieval time has to be content requesto | ||||
r-tolerant.</t> | ||||
</section> | ||||
<!-- must not introduce significant latencies. With more number of name | ||||
record replications, the number of nodes involved in the name resolution may be | ||||
reduced. For example, in the explicit name resolution approach, with the name re | ||||
cord being replicated to higher hierarchy or the peer NRS server in the overlay, | ||||
the name resolution can be responded more promptly. In the name based routing a | ||||
pproach, with the content based routing table being broadcast within the larger | ||||
scope in the network, the name resolution and request routing can have higher pr | ||||
obability to successfully reach the nearer copy of the requested content. | ||||
The NRS deployment should balance the number of nodes involved in the n | ||||
ame resolution and the overhead/cost for the name record replication. To ensure | ||||
the low latency, the NRS should be able to route a content request to the closes | ||||
t copy. Message forwarding and processing should be efficient and computation co | ||||
mplexity should be reasonable low and affordable by the current processor techno | ||||
logies. | ||||
<section title="Time transiency"> | ||||
<t>The NRS should support time-transient content, which is frequently c | ||||
reated in and disappearing from the network. This kind of content only stays in | ||||
the network for a short time, which requires the NRS to be able to promptly refl | ||||
ect the records of them in the system. For example, some video clip only exists | ||||
in the network for a very short time, which requires the NRS to promptly update | ||||
their name records. </t> | ||||
</section> | </section> | |||
<section numbered="true" toc="default"> | ||||
<section title="Response accuracy"> | <name>Response Accuracy</name> | |||
<t> | ||||
<t> | An NRS must provide an accurate response -- namely, a proper bindin | |||
An NRS must provide an accurate response, namely a proper binding o | g of the requested name (or prefix) with a location. The response can be either | |||
f the requested name (or prefix) with a location. The response can be either a ( | a (prefix, location) pair or the actual forwarding of a request to a node holdin | |||
prefix, location) pair, or the actual forwarding of a request to a node holding | g the content, which is then transmitted in return. | |||
the content, which is then transmitted in return. | </t> | |||
</t> | <t> | |||
<t> | An NRS must provide an up-to-date response -- namely, an NRS should | |||
An NRS must provide an up-to-date response, namely an NRS should be | be updated within a reasonable time when new copies of the content are being st | |||
updated within a reasonable time when new copies of the content are being store | ored in the network. While every transient cache addition/eviction should not tr | |||
d in the network. While every transient cache addition/eviction should not trigg | igger an NRS update, some origin servers may move and require the NRS to be upda | |||
er an NRS update, some origin servers may move and require the NRS to be updated | ted. | |||
. | </t> | |||
</t> | <t> | |||
<t> | An NRS must provide mechanisms to update the mapping of the content | |||
An NRS must provide mechanisms to update the mapping of the content | with its location. Namely, an NRS must provide a mechanism for a content provid | |||
with its location. Namely, an NRS must provide a mechanism for a content provid | er to add new content, revoke old/dated/obsolete content, and modify existing co | |||
er to add new content, revoke old/dated/obsolete content, and modify existing co | ntent. Any content update should then be propagated through | |||
ntent. Any content update should then be propagated through the NRS system withi | the NRS system within reasonable delay. | |||
n reasonable delay. | </t> | |||
</t> | <t> | |||
<t> | Content that is highly mobile may require specifying some type of a | |||
Content that is highly mobile may require to specify some type of a | nchor that is kept at the NRS instead of the content location. | |||
nchor that is kept at the NRS, instead of the content location. | </t> | |||
</t> | ||||
<!-- | ||||
<t>The NRS must provide accurate and up-to-date information on how to d | ||||
iscover the requested content with minimum overhead in propagating the update in | ||||
formation. For example, a content can be moved from one domain to another domain | ||||
due to the mobility of the producer, then the old name record should be deleted | ||||
from the NRS system and a new name record should be added and updated with mini | ||||
mum delay.</t> | ||||
Content mobility and expiration must be reflected in the corresponding | ||||
records in the NRS system with minimum delay to guarantee the accurate resolutio | ||||
n. | ||||
</section> | </section> | |||
<section numbered="true" toc="default"> | ||||
<section title="Resolution guarantee"> | <name>Resolution Guarantee</name> | |||
<t> | <t> | |||
An NRS must ensure that the name resolution is successful | An NRS must ensure that the name resolution is successful | |||
with high probability if the name matching content exists in the ne | with high probability if the name-matching content exists in the ne | |||
twork, | twork, | |||
regardless of its popularity and number of cached copies existing i | regardless of its popularity and the number of cached copies existi | |||
n the network. | ng in the network. | |||
As per Section 4.1, some resolution may not occur in a timely manne | Per <xref target="res-response"/>, some resolutions may not occur i | |||
r. | n a timely manner. | |||
However, the probability of such event should be minimized. | However, the probability of such an event should be minimized. | |||
The NRS system may provide a probability (say, five 9s, or | The NRS system may provide a probability (five 9s or | |||
five sigmas for instance) that a resolution will be satisfied. | five sigmas, for instance) that a resolution will be satisfied. | |||
</t> | </t> | |||
<!-- | ||||
<t>The NRS must ensure the name resolution success if the matching cont | ||||
ent exists in the network, regardless of its popularity, number of cached copies | ||||
. </t> | ||||
</section> | </section> | |||
<section numbered="true" toc="default"> | ||||
<section title="Resolution fairness"> | <name>Resolution Fairness</name> | |||
<t> | <t> | |||
An NRS could provide this service for all content in a fair manner, independently of the specific content properties | An NRS could provide this service for all content in a fair manner, independently of the specific content properties | |||
(content producer, content popularity, availability of copies, cont ent format, etc.). | (content producer, content popularity, availability of copies, cont ent format, etc.). | |||
Fairness may be defined as a per request delay to complete the NRS steps that is not agnostic to the properties of the content itself. | Fairness may be defined as a per-request delay to complete the NRS steps that is agnostic to the properties of the content itself. | |||
Fairness may be defined as well as the number of requests answered per unit of time. | Fairness may be defined as well as the number of requests answered per unit of time. | |||
</t> | </t> | |||
<t> | <t> | |||
However, it is notable that content (or their associated producer) | However, it is notable that content (or their associated producer) | |||
may request a different level of QoS from the network (see <xref target="RFC9064 | may request a different level of QoS from the network (see <xref target="RFC9064 | |||
"></xref> for instance), | " format="default"/>, for instance), | |||
and this may include the NRS as well, in which case considerations of fairness may be restricted to content within the same class of service. | and this may include the NRS as well, in which case considerations of fairness may be restricted to content within the same class of service. | |||
</t> | </t> | |||
</section> | ||||
</section> | <section numbered="true" toc="default"> | |||
<name>Scalability</name> | ||||
<section title="Scalability"> | <t> | |||
<t> | ||||
The NRS system must scale up to support a very large user populatio n (including human users as well as machine-to-machine communications). | The NRS system must scale up to support a very large user populatio n (including human users as well as machine-to-machine communications). | |||
As an idea of the scale, it is expected that 50 billion devices wil l be connected in 2025 (per ITU projections). | As an idea of the scale, it is expected that 50 billion devices wil l be connected in 2025 (per ITU projections). | |||
The system must be able to respond to a very large number of reques ts per unit of time. | The system must be able to respond to a very large number of reques ts per unit of time. | |||
Message forwarding and processing, routing table building-up and na | Message forwarding and processing, routing table buildup, and name | |||
me records propagation must be efficient and scalable. | record propagation must be efficient and scalable. | |||
</t> | </t> | |||
<t> | <t> | |||
The NRS system must scale up with the number of pieces of content ( content names) and should be able to support a content catalog that is extremely large. | The NRS system must scale up with the number of pieces of content ( content names) and should be able to support a content catalog that is extremely large. | |||
Internet traffic is of the order of the zettabytes per year (10^21 bytes). Since NRS is associated with actual traffic, | Internet traffic is of the order of zettabytes per year (10<sup>21< /sup> bytes). Since NRS is associated with actual traffic, | |||
the number of pieces of content should scale with the amount of tra ffic. Content size may vary from a few bytes to several GB, | the number of pieces of content should scale with the amount of tra ffic. Content size may vary from a few bytes to several GB, | |||
so the NRS should be expected scale up to catalog of the size of 10 | so the NRS should be expected scale up to a catalog of the size of | |||
^21 in the near future, and larger beyond. | 10<sup>21</sup> in the near future, and larger beyond. | |||
</t> | </t> | |||
<t> | <t> | |||
The NRS system must be able to scale up, namely to add NRS servers | The NRS system must be able to scale up -- namely, to add NRS serve | |||
to the NRS system, in a way that is transparent to the users. | rs to the NRS system in a way that is transparent to the users. | |||
Addition of a new server should have limited negative impact on the | The addition of a new server should have a limited negative impact | |||
other NRS servers | on the other NRS servers | |||
(or should have a negative impact on only a small subset of the NRS servers). | (or should have a negative impact on only a small subset of the NRS servers). | |||
The impact of adding new servers may induce some overhead at the ot her servers to rebuild a hierarchy or to exchange messages to include the new se rver within the service. | The impact of adding new servers may induce some overhead at the ot her servers to rebuild a hierarchy or to exchange messages to include the new se rver within the service. | |||
Further, data may be shared among the new servers, for load balanci | Further, data may be shared among the new servers for load balancin | |||
ng or tolerance to failure. | g or tolerance to failure. | |||
These steps should not disrupt the service provided by the NRS and | These steps should not disrupt the service provided by the NRS and | |||
should in the long run improve the quality of the service. | should improve the quality of the service in the long run. | |||
</t> | </t> | |||
<t> | <t> | |||
The NRS system may support access from a heterogeneity of connectio n methods and devices. | The NRS system may support access from a heterogeneity of connectio n methods and devices. | |||
In particular, the NRS system may support access from constrained d | In particular, the NRS system may support access from constrained d | |||
evices and interactions with the NRS system would not be too costly. | evices, and interactions with the NRS system would not be too costly. | |||
An IoT node for instance should be able to access the NRS system as | An IoT node, for instance, should be able to access the NRS system | |||
well as a more powerful node. | as well as a more powerful node. | |||
</t> | </t> | |||
<t> | <t> | |||
The NRS system should scale up in its responsiveness to the increas | The NRS system should scale up in its responsiveness to the increas | |||
ed request rate that is expected from applications such as IoT or M2M, | ed request rate that is expected from applications such as IoT or machine-to-mac | |||
where data is being frequently generated and/or frequently requeste | hine (M2M), | |||
d. | where data is being frequently generated and/or requested. | |||
</t> | </t> | |||
</section> | ||||
</section> | <section numbered="true" toc="default"> | |||
<name>Manageability</name> | ||||
<section title="Manageability"> | <t> | |||
<t> | ||||
The NRS system must be manageable since some parts of the system ma y grow or shrink dynamically and an NRS system node may be added or deleted freq uently. | The NRS system must be manageable since some parts of the system ma y grow or shrink dynamically and an NRS system node may be added or deleted freq uently. | |||
</t> | </t> | |||
<t> | <t> | |||
The NRS system may support an NRS management layer that allows for | The NRS system may support an NRS management layer that allows for | |||
adding or subtracting NRS nodes. In order to infer the circumstance, the manage | adding or subtracting NRS nodes. In order to infer the circumstance, the manage | |||
ment layer can measure network status. | ment layer can measure the network status. | |||
</t> | </t> | |||
<!-- | ||||
<t>The NRS system must be manageable since some parts of the system may | ||||
grow or shrink dynamically and a NRS system node may be added or deleted. </t> | ||||
</section> | </section> | |||
<section numbered="true" toc="default"> | ||||
<section title="Deployed system"> | <name>Deployed System</name> | |||
<t> | <t> | |||
The NRS system must be deployable since deployability is important for a real-world system. The NRS system must be deployable in network edges and cores so that the consumers as well as ICN routers can perform name resolution i n a very low latency. | The NRS system must be deployable since deployability is important for a real-world system. The NRS system must be deployable in network edges and cores so that the consumers as well as ICN routers can perform name resolution i n a very low latency. | |||
</t> | </t> | |||
<!-- | ||||
<t>The NRS system must be deployable since deployability is important f | ||||
or a real world system. If the NRS system can be deployed from the edges, then t | ||||
he deployment can be simplified. </t> | ||||
</section> | </section> | |||
<section numbered="true" toc="default"> | ||||
<section title="Fault tolerance"> | <name>Fault Tolerance</name> | |||
<t> | <t> | |||
The NRS system must ensure resiliency in the event of NRS server fa ilures. | The NRS system must ensure resiliency in the event of NRS server fa ilures. | |||
The failure of a small subset of nodes should not impact the NRS pe rformance significantly. | The failure of a small subset of nodes should not impact the NRS pe rformance significantly. | |||
</t> | </t> | |||
<t> | <t> | |||
After an NRS server fails, the NRS system must be able to recover a nd/or restore the name records stored in the NRS server. | After an NRS server fails, the NRS system must be able to recover a nd/or restore the name records stored in the NRS server. | |||
</t> | </t> | |||
<!-- | ||||
<t>The NRS system must ensure resilience to node failures. After a NRS | ||||
node fails, the NRS system must be able to restore the name records stored in th | ||||
e NRS node. </t> | ||||
The NRS must also ensure resolution failure at one NRS node would be re | ||||
solved and corrected by other NRS nodes. | ||||
<t>For example, in the explicit name resolution approach, when a NRS ove | ||||
rlay server fails, the name records should be able to transferred and recovered | ||||
in its peer server or its replacement. In the name based approach, the failure o | ||||
f one ICN router does not cause much trouble in the name resolution, because the | ||||
other alternative paths can be established that bypass the failed ICN router. H | ||||
owever, it requires that the ICN router has propagated its name based routing in | ||||
formation in the network. </t> | ||||
</section> | </section> | |||
<section numbered="true" toc="default" anchor="sec-priv"> | ||||
<section title="Security and privacy"> | <name>Security and Privacy</name> | |||
<t> | ||||
<t> | ||||
On utilizing an NRS in ICN, there are some security consideration s for the | On utilizing an NRS in ICN, there are some security consideration s for the | |||
NRS servers/nodes and name mapping records stored in the NRS syst em. | NRS servers/nodes and name mapping records stored in the NRS syst em. | |||
This subsection describes them. | This subsection describes them. | |||
</t> | </t> | |||
<section numbered="true" toc="default"> | ||||
<section title="Confidentiality"> | <name>Confidentiality</name> | |||
<t> | <t> | |||
The name mapping records in the NRS system must be assigned with | The name mapping records in the NRS system must be assigned with | |||
proper access rights such that the information contained in the name | proper access rights such that the information contained in the name | |||
mapping records would not be revealed to unauthorized users . | mapping records would not be revealed to unauthorized users . | |||
</t> | </t> | |||
<t> | <t> | |||
The NRS system may support access control for certain name mapping | The NRS system may support access control for certain name mapping | |||
records. Access control can be implemented with a reference monitor | records. Access control can be implemented with a reference monitor | |||
that uses client authentication, so only users with appropr iate | that uses client authentication, so only users with appropr iate | |||
credentials can access these records, and they are not shar ed with | credentials can access these records, and they are not shar ed with | |||
unauthorized users. Access control can also be implemented by | unauthorized users. Access control can also be implemented by | |||
encryption-based techniques using control of keys to contro l the | encryption-based techniques using control of keys to contro l the | |||
propagations of the mappings. | propagations of the mappings. | |||
</t> | </t> | |||
<t> | <t> | |||
The NRS system may support obfuscation and/or encryption | The NRS system may support obfuscation and/or encryption | |||
mechanisms so that the content of a resolution request | mechanisms so that the content of a resolution request | |||
may not be accessible by third parties outside of the NRS s ystem. | may not be accessible by third parties outside of the NRS s ystem. | |||
</t> | </t> | |||
<t> | <t> | |||
The NRS system must keep confidentiality to prevent | The NRS system must keep confidentiality to prevent | |||
sensitive name mapping records from being reached by | sensitive name mapping records from being reached by | |||
unauthorized data requesters. This is more required | unauthorized data requesters. This is more required | |||
in IoT environments where a lot of sensitive data is produc ed. | in IoT environments where a lot of sensitive data is produc ed. | |||
</t> | </t> | |||
<t> | <t> | |||
The NRS system must also keep confidentiality of meta-data | The NRS system must also keep confidentiality of metadata | |||
as well as NRS usage to protect the privacy of the users. | as well as NRS usage to protect the privacy of the users. | |||
For instance, a specific user's NRS requests should | For instance, a specific user's NRS requests should | |||
not be shared outside the NRS system (with the exception | not be shared outside the NRS system (with the exception | |||
of legal intercept). | of legal intercept). | |||
</t> | </t> | |||
</section> | </section> | |||
<section numbered="true" toc="default"> | ||||
<section title="Authentication"> | <name>Authentication</name> | |||
<t> | <ul spacing="normal"> | |||
<list style="symbols"> | <li> | |||
<t> | ||||
NRS server authentication: Authentication of the ne w NRS | NRS server authentication: Authentication of the ne w NRS | |||
servers/nodes that want to be registered with the N RS system | servers/nodes that want to be registered with the N RS system | |||
must be required so that only authenticated entitie s can | must be required so that only authenticated entitie s can | |||
store and update name mapping records. The NRS syst em should | store and update name mapping records. The NRS syst em should | |||
detect an attacker attempting to act as a fake NRS server | detect an attacker attempting to act as a fake NRS server | |||
to cause service disruption or manipulate name mapp ing records. | to cause service disruption or manipulate name mapp ing records. | |||
</t> | </li> | |||
<t> | <li> | |||
Producer authentication: The NRS system must suppor t | Producer authentication: The NRS system must suppor t | |||
authentication of the content producers to ensure t hat | authentication of the content producers to ensure t hat | |||
update/addition/removal of name mapping records req uested | update/addition/removal of name mapping records req uested | |||
by content producers are actually valid and that co ntent | by content producers are actually valid and that co ntent | |||
producers are authorized to modify (or revoke) thes e records | producers are authorized to modify (or revoke) thes e records | |||
or add new records. | or add new records. | |||
</t> | </li> | |||
<t> | <li> | |||
Mapping record authentication: The NRS should verif y new | Mapping record authentication: The NRS should verif y new | |||
mapping records that are being registered so that i t cannot | mapping records that are being registered so that i t cannot | |||
be polluted with falsified information or invalid r ecords. | be polluted with falsified information or invalid r ecords. | |||
</t> | </li> | |||
</ul> | ||||
</list> | </section> | |||
</t> | <section numbered="true" toc="default"> | |||
<name>Integrity</name> | ||||
</section> | <t> | |||
The NRS system must be protected from malicious users | ||||
<section title="Integrity"> | ||||
<t> | ||||
The NRS system must be prevented from malicious users | ||||
attempting to hijack or corrupt the name mapping records. | attempting to hijack or corrupt the name mapping records. | |||
</t> | </t> | |||
</section> | ||||
</section> | <section numbered="true" toc="default"> | |||
<name>Resiliency and Availability</name> | ||||
<section title="Resiliency and availability"> | <t> | |||
<t> | The NRS system should be resilient against denial-of-servic | |||
The NRS system should be resilient against denial of servic | e attacks | |||
e attacks | ||||
and other common attacks to isolate the impact of the attac ks and | and other common attacks to isolate the impact of the attac ks and | |||
prevent collateral damage to the entire system. Therefore, if a | prevent collateral damage to the entire system. Therefore, if a | |||
part of the NRS system fails, the failure should only affec t a local | part of the NRS system fails, the failure should only affec t a local | |||
domain. And fast recovery mechanisms need to be in place to bring | domain. And fast recovery mechanisms need to be in place to bring | |||
the service back to normal. | the service back to normal. | |||
</t> | </t> | |||
</section> | </section> | |||
</section> | ||||
</section> | </section> | |||
<section numbered="true" toc="default"> | ||||
</section> | <name>Conclusion</name> | |||
<t> | ||||
<section title="Conclusion"> | ||||
<t> | ||||
ICN routing may comprise three steps: name resolution, content request routi ng, | ICN routing may comprise three steps: name resolution, content request routi ng, | |||
and content delivery. This document investigates the name resolution step, | and content delivery. This document investigates the name resolution step, | |||
which is the first and most important to be achieved for ICN routing to be | which is the first and most important to be achieved for ICN routing to be | |||
successful. A Name Resolution Service (NRS) in ICN is defined as the service | successful. A Name Resolution Service (NRS) in ICN is defined as the service | |||
that provides such a function of name resolution for translating an object | that provides such a function of name resolution for translating an object | |||
name into some other information such as a locator, another name, metadata, | name into some other information such as a locator, another name, metadata, | |||
next hop info, etc. that is used for forwarding the object request. | next-hop info, etc. that is used for forwarding the object request. | |||
</t> | </t> | |||
<t> | <t> | |||
This document classifies and analyzes the NRS approaches according to whethe r | This document classifies and analyzes the NRS approaches according to whethe r | |||
the name resolution step is separated from the content request routing as an | the name resolution step is separated from the content request routing as an | |||
explicit process or not. This document also explains the NRS functions used | explicit process or not. This document also explains the NRS functions used | |||
to support heterogeneous name types, producer mobility, scalable routing sys tem, | to support heterogeneous name types, producer mobility, scalable routing sys tem, | |||
off-path caching, nameless object, manifest, and metadata. Finally, this doc ument | off-path caching, nameless object, manifest, and metadata. Finally, this doc ument | |||
presents design considerations for NRS in ICN, which include resolution resp onse | presents design considerations for NRS in ICN, which include resolution resp onse | |||
time and accuracy, resolution guarantee, resolution fairness, scalability, | time and accuracy, resolution guarantee, resolution fairness, scalability, | |||
manageability, deployed system, and fault tolerance. | manageability, deployed system, and fault tolerance. | |||
</t> | </t> | |||
</section> | </section> | |||
<section anchor="IANA" numbered="true" toc="default"> | ||||
<section anchor="IANA" title="IANA Considerations"> | <name>IANA Considerations</name> | |||
<t>There are no IANA considerations related to this document.</t> | <t>This document has no IANA actions.</t> | |||
</section> | </section> | |||
<section numbered="true" toc="default"> | ||||
<section title="Security Considerations"> | <name>Security Considerations</name> | |||
<t> | <t> | |||
A discussion of security guidelines was provided in section 4.9. | A discussion of security guidelines is provided in <xref target="sec-pri v"/>. | |||
</t> | </t> | |||
</section> | ||||
</section> | </middle> | |||
</middle> | ||||
<!-- *****BACK MATTER ***** --> | ||||
<back> | <back> | |||
<!-- References split into informative and normative --> | ||||
<!-- There are 2 ways to insert reference entries from the citation librarie | ||||
s: | ||||
1. define an ENTITY at the top, and use "ampersand character"RFC2629; here | ||||
(as shown) | ||||
2. simply use a PI "less than character"?rfc include="reference.RFC.2119.xm | ||||
l"?> here | ||||
(for I-Ds: include="reference.I-D.narten-iana-considerations-rfc2434bis.xml | ||||
") | ||||
Both are cited textually in the same manner: by using xref elements. | ||||
If you use the PI option, xml2rfc will, by default, try to find included fi | ||||
les in the same | ||||
directory as the including file. You can also define the XML_LIBRARY enviro | ||||
nment variable | ||||
with a value containing a set of directories to search. These can be eithe | ||||
r in the local | ||||
filing system or remote ones accessed by http (http://domain/dir/... ).--> | ||||
<references title="Normative References"> | ||||
&rfc7927; | ||||
</references> | ||||
<references title="Informative References"> | ||||
<reference anchor='Ahlgren'> | ||||
<front> | ||||
<title>A Survey of Information-Centric Networking</title> | ||||
<author initials='B.' surname='Ahlgren' fullname='B. Ahlgren'></author | ||||
> | ||||
<author initials='C.' surname='Dannewitz' fullname='C. Dannewitz'></au | ||||
thor> | ||||
<author initials='C.' surname='Imbrenda' fullname='C. Imbrenda'></auth | ||||
or> | ||||
<author initials='D.' surname='Kutscher' fullname='D. Kutscher'></auth | ||||
or> | ||||
<author initials='B.' surname='Ohlman' fullname='B. Ohlman'></author> | ||||
<date month='' year='2012' /> | ||||
</front> | ||||
<seriesInfo name='IEEE Communications Magarzine' value='Vol.50, Issue 7' | ||||
/> | ||||
</reference> | ||||
<reference anchor='Xylomenos'> | ||||
<front> | ||||
<title>A Survey of Information-Centric Networking Research,Communicati | ||||
ons Surveys and Tutorials</title> | ||||
<author initials='G.' surname='Xylomenos' fullname='G. Xylomenos'></au | ||||
thor> | ||||
<author initials='C. N.' surname='Ververidis' fullname='C. N. Ververid | ||||
is'></author> | ||||
<author initials='V. A.' surname='Siris' fullname='V. A. Siris'></auth | ||||
or> | ||||
<author initials='N.' surname='Fotiou' fullname='N. Fotiou'></author> | ||||
<author initials='C.' surname='Tsilopoulos' fullname='C.Tsilopoulos'>< | ||||
/author> | ||||
<author initials='X.' surname='Vasilako' fullname='X. Vasilako'></auth | ||||
or> | ||||
<author initials='K. V.' surname='Katsaros' fullname='K. V. Katsaros'> | ||||
</author> | ||||
<author initials='G. C.' surname='Polyzos' fullname='G. C. Polyzos'></ | ||||
author> | ||||
<date month='' year='2014' /> | ||||
</front> | ||||
<seriesInfo name='IEEE Communications Surveys and Tutorials' value='vol. | ||||
16, no. 2' /> | ||||
</reference> | ||||
<reference anchor='Baccelli'> | ||||
<front> | ||||
<title>Information Centric Networking in the IoT: Experiments with NDN | ||||
in the Wild</title> | ||||
<author initials='E.' surname='Baccelli' fullname='E. Baccelli'></auth | ||||
or> | ||||
<author initials='C.' surname='Mehlis' fullname='C. Mehlis'></author> | ||||
<author initials='O.' surname='Hahm' fullname='O. Hahm'></author> | ||||
<author initials='T.' surname='Schmidt' fullname='T. Schmidt'></author | ||||
> | ||||
<author initials='M.' surname='Wahlisch' fullname='M. Wahlisch'></auth | ||||
or> | ||||
<date month='' year='2014' /> | ||||
</front> | ||||
<seriesInfo name='ACM ICN' value='2014' /> | ||||
</reference> | ||||
<reference anchor='Amadeo'> | ||||
<front> | ||||
<title>Named data networking for IoT: An architectural perspective</ti | ||||
tle> | ||||
<author initials='M.' surname='Amadeo' fullname='M. Amadeo'></author> | ||||
<author initials='C.' surname='Campolo' fullname='C. Campolo'></author | ||||
> | ||||
<author initials='A.' surname='Iera' fullname='A. Iera'></author> | ||||
<author initials='A.' surname='Molinaro' fullname='A. Molinaro'></auth | ||||
or> | ||||
<date month='' year='2014' /> | ||||
</front> | ||||
<seriesInfo name='European Conference on Networks and Communications (Eu | ||||
CNC)' value='' /> | ||||
</reference> | ||||
<reference anchor='Quevedo'> | ||||
<front> | ||||
<title>A case for ICN usage in IoT environments</title> | ||||
<author initials='J.' surname='Quevedo' fullname='J. Quevedo'></ | ||||
author> | ||||
<author initials='D.' surname='Corujo' fullname='D. Corujo'></au | ||||
thor> | ||||
<author initials='R.' surname='Aguiar' fullname='R. Aguiar'></au | ||||
thor> | ||||
<date month='' year='2014' /> | ||||
</front> | ||||
<seriesInfo name='IEEE GLOBECOM' value='' /> | ||||
</reference> | ||||
<reference anchor='Amadeo2'> | <displayreference target="I-D.irtf-icnrg-icniot" to="ID.Zhang2"/> | |||
<displayreference target="I-D.ravi-icnrg-ccn-forwarding-label" to="Ravindran"/> | ||||
<front> | <displayreference target="I-D.irtf-icnrg-flic" to="FLIC"/> | |||
<title>Information-centric networking for the internet of things: chal | <displayreference target="I-D.irtf-icnrg-nrsarch-considerations" to="NRSarch"/> | |||
lenges and opportunitiesve</title> | <references> | |||
<author initials='' surname='Amadeo, M. et al.' fullname='Amadeo, M. et al.' | <name>References</name> | |||
></author> | <references> | |||
<date month='July' year='2016' /> | <name>Normative References</name> | |||
<xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.R | ||||
</front> | FC.7927.xml"/> | |||
<seriesInfo name='IEEE Network' value='vol. 30, no. 2' /> | </references> | |||
<references> | ||||
</reference> | <name>Informative References</name> | |||
<xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.R | ||||
<reference anchor='ID.Zhang2'> | FC.8569.xml"/> | |||
<front> | ||||
<title>Design Considerations for Applying ICN to IoT</title> | ||||
<author initials='' surname='Ravindran, R. et al.' fullname='Rav | ||||
indran, R. et al.'></author> | ||||
<date month='May' year='2019' /> | ||||
</front> | ||||
<seriesInfo name='draft-zhang-icnrg-icniot-03' value='' /> | ||||
</reference> | ||||
<reference anchor='Koponen'> | ||||
<front> | ||||
<title>A Data-Oriented (and Beyond) Network Architecture</title> | ||||
<author initials='T.' surname='Koponen' fullname='T. Koponen'></author | ||||
> | ||||
<author initials='M.' surname='Chawla' fullname='M. Chawla'></author> | ||||
<author initials='B.' surname='Chun' fullname='B. Chun'></author> | ||||
<author initials='A.' surname='Ermolinskiy' fullname='A. Ermolinskiy'> | ||||
</author> | ||||
<author initials='K. H.' surname='Kim' fullname='K. H. Kim'></author> | ||||
<author initials='S.' surname='Shenker' fullname='S. Shenker'></author | ||||
> | ||||
<author initials='I.' surname='Stoica' fullname='I. Stoica'></author> | ||||
<date month='' year='2007' /> | ||||
</front> | ||||
<seriesInfo name='ACM SIGCOMM' value='2007 pp. 181-192' /> | ||||
</reference> | ||||
<reference anchor='PURSUIT'> | ||||
<front> | ||||
<title>FP7 PURSUIT project.</title> | ||||
<author initials='' surname='' fullname=''></author> | ||||
<date month='' year='' /> | ||||
</front> | ||||
<seriesInfo name='http://www.fp7-pursuit.eu/PursuitWeb/' value='' /> | ||||
</reference> | ||||
<reference anchor='SAIL'> | ||||
<front> | ||||
<title>FP7 SAIL project.</title> | ||||
<author initials='' surname='' fullname=''></author> | ||||
<date month='' year='' /> | ||||
</front> | ||||
<seriesInfo name='http://www.sail-project.eu/' value='' /> | ||||
</reference> | ||||
<reference anchor='NDN'> | ||||
<front> | ||||
<title>NSF Named Data Networking project.</title> | ||||
<author initials='' surname='' fullname=''></author> | ||||
<date month='' year='' /> | ||||
</front> | ||||
<seriesInfo name='http://www.named-data.net' value='' /> | ||||
</reference> | ||||
<reference anchor='CCNx'> | ||||
<front> | ||||
<title>Content Centric Networking project.</title> | ||||
<author initials='' surname='' fullname=''></author> | ||||
<date month='' year='' /> | ||||
</front> | ||||
<seriesInfo name='https://wiki.fd.io/view/Cicn' value='' /> | ||||
</reference> | ||||
<reference anchor='MF'> | ||||
<front> | ||||
<title>NSF Mobility First project.</title> | ||||
<author initials='' surname='' fullname=''></author> | ||||
<date month='' year='' /> | ||||
</front> | ||||
<seriesInfo name='http://mobilityfirst.winlab.rutgers.edu/' value='' /> | ||||
</reference> | ||||
<reference anchor='Jung'> | ||||
<front> | ||||
<title>IDNet: Beyond All-IP Network</title> | ||||
<author initials='' surname='Jung, H. et al.' fullname='H. Jung et al. | ||||
' ></author> | ||||
<date month='October' year='2015' /> | ||||
</front> | ||||
<seriesInfo name='ETRI Jouranl' value='vol. 37, no. 5' /> | ||||
</reference> | ||||
<reference anchor="SA2-5GLAN"> | ||||
<front> | ||||
<title>SP-181129, Work Item Description, Vertical_LAN(SA2), 5GS Enhan | ||||
ced Support of Vertical and LAN Services</title> | ||||
<author initials="" surname="3gpp-5glan" /> | ||||
<date year="http://www.3gpp.org/ftp/tsg_sa/TSG_SA/TSGS_82/Docs/SP-181 | ||||
120.zip"/> | ||||
</front> | ||||
<seriesInfo name="3GPP" value=""/> | ||||
</reference> | ||||
<!-- | ||||
<reference anchor='Jacobson'> | ||||
<front> | ||||
<title>Networking Named Content</title> | ||||
<author initials='V.' surname='Jacobson' fullname='V. Jacobson'></auth | ||||
or> | ||||
<author initials='D. K.' surname='Smetters' fullname='D. K. Smetters'> | ||||
</author> | ||||
<author initials='J. D.' surname='Thornton' fullname='J. D. Thornton'> | ||||
</author> | ||||
<author initials='M. F.' surname='Plass' fullname='M. F. Plass'></auth | ||||
or> | ||||
<author initials='N. H.' surname='Briggs' fullname='N. H. Briggs'></au | ||||
thor> | ||||
<author initials='R. L.' surname='Braynard' fullname='R. L. Braynard'> | ||||
</author> | ||||
<date month='' year='2009' /> | ||||
</front> | ||||
<seriesInfo name='ACM CoNEXT' value='' /> | ||||
</reference> | ||||
<reference anchor='Baid'> | ||||
<front> | ||||
<title>Comparing Alternative Approaches for Networking of Named Object | ||||
s in the Future Internet</title> | ||||
<author initials='A.' surname='Baid' fullname='A. Baid'></author> | ||||
<author initials='T.' surname='Vu' fullname='T. Vu'></author> | ||||
<author initials='D.' surname='Raychaudhuri' fullname='D. Raychaudhuri | ||||
'></author> | ||||
<date month='' year='2012' /> | ||||
</front> | ||||
<seriesInfo name='IEEE Workshop on Emerging Design Choices in Name-Orien | ||||
ted Networking (NOMEN)' value='' /> | ||||
</reference> | ||||
<reference anchor='Bari'> | ||||
<front> | ||||
<title>A Survey of Naming and Routing in Information-Centric Networks< | ||||
/title> | ||||
<author initials='M. F.' surname='Bari' fullname='M. F. Bari'></author | ||||
> | ||||
<author initials='S. R.' surname='Chowdhury' fullname='S. R. Chowdhury | ||||
'></author> | ||||
<author initials='R.' surname='Ahmed' fullname='R. Ahmed'></author> | ||||
<author initials='R.' surname='Boutaba' fullname='R. Boutaba'></author | ||||
> | ||||
<author initials='B.' surname='Mathieu' fullname='B. Mathieu'></author | ||||
> | ||||
<date month='' year='2012' /> | ||||
</front> | ||||
<seriesInfo name='IEEE Communications Magazine' value='Vol. 50, No. 12, | ||||
P.44-53' /> | ||||
</reference> | ||||
<!-- | <reference anchor="Ahlgren"> | |||
<reference anchor='Rajahalme'> | <front> | |||
<front> | <title>A Survey of Information-Centric Networking</title> | |||
<title>On Name-based Inter-domain Routing</title> | <author initials="B." surname="Ahlgren" fullname="B. Ahlgren"/> | |||
<author initials='J.' surname='Rajahalme' fullname='J. Rajahalme'></au | <author initials="C." surname="Dannewitz" fullname="C. Dannewitz"/> | |||
thor> | <author initials="C." surname="Imbrenda" fullname="C. Imbrenda"/> | |||
<author initials='M.' surname='Sarela' fullname='M. Sarela'></author> | <author initials="D." surname="Kutscher" fullname="D. Kutscher"/> | |||
<author initials='K.' surname='Visala' fullname='K. Visala'></author> | <author initials="B." surname="Ohlman" fullname="B. Ohlman"/> | |||
<author initials='J.' surname='Riihijarvi' fullname='J. Riihijarvi'></ | <date month="July" year="2012"/> | |||
author> | </front> | |||
<date month='March' year='2011' /> | <seriesInfo name="DOI" value="10.1109/MCOM.2012.6231276"/> | |||
</front> | <refcontent>IEEE Communications Magazine, Vol. 50, Issue 7</refcontent | |||
<seriesInfo name='Computer Networks' value='Vol. 55, No. 4, P. 975-986' | > | |||
/> | </reference> | |||
</reference> | ||||
<reference anchor='Katsaros'> | <reference anchor="Xylomenos"> | |||
<front> | <front> | |||
<title>On Inter-Domain Name Resolution for Information-Centric Network | <title>A Survey of Information-Centric Networking Research</title> | |||
s</title> | <author initials="G." surname="Xylomenos" fullname="G. Xylomenos"/> | |||
<author initials='K. V.' surname='Katsaros' fullname='K. V. Katsaros'> | <author initials="C." surname="Ververidis" fullname="C. Ververidis"/ | |||
</author> | > | |||
<author initials='N.' surname='Fotiou' fullname='N. Fotiou'></author> | <author initials="V." surname="Siris" fullname="V. Siris"/> | |||
<author initials='X.' surname='Vasilakos' fullname='X. Vasilakos'></au | <author initials="N." surname="Fotiou" fullname="N. Fotiou"/> | |||
thor> | <author initials="C." surname="Tsilopoulos" fullname="C.Tsilopoulos" | |||
<author initials='C. N.' surname='Ververidis' fullname='C. N. Ververid | /> | |||
is'></author> | <author initials="X." surname="Vasilakos" fullname="X. Vasilakos"/> | |||
<author initials='C.' surname='Tsilopoulos' fullname='C. Tsilopoulos'> | <author initials="K." surname="Katsaros" fullname="K. Katsaros"/> | |||
</author> | <author initials="G." surname="Polyzos" fullname="G. Polyzos"/> | |||
<author initials='G.' surname='Xylomenos' fullname='G. Xylomenos'></au | <date year="2014"/> | |||
thor> | </front> | |||
<author initials='G. C.' surname='Polyzos' fullname='G. C. Polyzos'></ | <seriesInfo name="DOI" value="10.1109/SURV.2013.070813.00063"/> | |||
author> | <refcontent>IEEE Communications Surveys and Tutorials, Vol. 16, Issue | |||
<date month='' year='2012' /> | 2</refcontent> | |||
</front> | </reference> | |||
<seriesInfo name='Proc.IFIP-TC6 Networking Conference' value='' /> | ||||
</reference> | ||||
<reference anchor='ID.Wang'> | <reference anchor="Baccelli"> | |||
<front> | <front> | |||
<title>Namespace Resolution in Future Internet Architectures</title> | <title>Information Centric Networking in the IoT: Experiments with N | |||
<author initials='J.' surname='Wang' fullname='J. Wang'></author> | DN in the Wild</title> | |||
<author initials='S.' surname='Li' fullname='S. Li'></author> | <author initials="E." surname="Baccelli" fullname="E. Baccelli"/> | |||
<author initials='C.' surname='Wetphal' fullname='C. Wetphal'></author | <author initials="C." surname="Mehlis" fullname="C. Mehlis"/> | |||
> | <author initials="O." surname="Hahm" fullname="O. Hahm"/> | |||
<date month='October' year='2015' /> | <author initials="T." surname="Schmidt" fullname="T. Schmidt"/> | |||
</front> | <author initials="M." surname="Wählisch" fullname="M. Wählisch"/> | |||
<seriesInfo name='draft-wang-fia-namespace-01' value='' /> | <date month="" year="2014"/> | |||
</reference> | </front> | |||
<seriesInfo name="DOI" value="10.1145/2660129.2660144"/> | ||||
<refcontent>ACM-ICN 2014</refcontent> | ||||
</reference> | ||||
<reference anchor='ID.Zhang'> | <reference anchor="Amadeo"> | |||
<front> | <front> | |||
<title>PID: A Generic Naming Schema for Information-centric Network</t | <title>Named data networking for IoT: An architectural perspective</ | |||
itle> | title> | |||
<author initials='X.' surname='Zhang' fullname='X. Zhang'></author> | <author initials="M." surname="Amadeo" fullname="M. Amadeo"/> | |||
<author initials='R.' surname='Ravindran' fullname='R. Ravindran'></au | <author initials="C." surname="Campolo" fullname="C. Campolo"/> | |||
thor> | <author initials="A." surname="Iera" fullname="A. Iera"/> | |||
<author initials='H.' surname='Xie' fullname='H. Xie'></author> | <author initials="A." surname="Molinaro" fullname="A. Molinaro"/> | |||
<author initials='G.' surname='Wang' fullname='G. Wang'></author> | <date month="June" year="2014"/> | |||
<date month='August' year='2013' /> | </front> | |||
</front> | <seriesInfo name="DOI" value="10.1109/EuCNC.2014.6882665"/> | |||
<seriesInfo name='draft-zhang-icnrg-pid-naming-scheme-03' value='' /> | <refcontent>European Conference on Networks and Communications (EuCNC) | |||
</reference> | </refcontent> | |||
</reference> | ||||
<reference anchor='D.Zhang'> | <reference anchor="Quevedo"> | |||
<front> | <front> | |||
<title>Routing and Name Resolution in Information-Centric Networks</ti | <title>A case for ICN usage in IoT environments</title> | |||
tle> | <author initials="J." surname="Quevedo" fullname="J. Quevedo"/> | |||
<author initials='D.' surname='Zhang' fullname='D. Zhang'></author> | <author initials="D." surname="Corujo" fullname="D. Corujo"/> | |||
<author initials='H.' surname='Liu' fullname='H. Liu'></author> | <author initials="R." surname="Aguiar" fullname="R. Aguiar"/> | |||
<date month='' year='2013' /> | <date month="December" year="2014"/> | |||
</front> | </front> | |||
<seriesInfo name='22nd International Conference on Computer Communicatio | <seriesInfo name="DOI" value="GLOCOM.2014.7037227"/> | |||
ns and Networks (ICCCN)' value='' /> | <refcontent>IEEE GLOBECOM</refcontent> | |||
</reference> | </reference> | |||
<reference anchor='Sevilla'> | <reference anchor="Amadeo2"> | |||
<front> | <front> | |||
<title>iDNS: Enabling Information Centric Networking Through The DNS</ | <title>Information-centric networking for the internet of things: ch | |||
title> | allenges and opportunities</title> | |||
<author initials='S.' surname='Sevilla' fullname='S. Sevilla'></author | <author initials="" surname="Amadeo, M. et al." fullname="Amadeo, M. | |||
> | et al."/> | |||
<author initials='P.' surname='Mahadevan' fullname='P. Mahadevan'></au | <date month="March" year="2016"/> | |||
thor> | </front> | |||
<author initials='J.' surname='Garcia-Luna-Aceves' fullname='J. Garcia | <seriesInfo name="DOI" value="10.1109/MNET.2016.7437030"/> | |||
-Luna-Aceves'></author> | <refcontent>IEEE Network, Vol. 30, No. 2</refcontent> | |||
<date month='' year='2014' /> | </reference> | |||
</front> | ||||
<seriesInfo name='Name Oriented Mobility (workshop co-located with Infoc | ||||
om 2014)' value='' /> | ||||
</reference> | ||||
&rfc1498; | <xi:include href="https://datatracker.ietf.org/doc/bibxml3/reference.I-D.irtf-ic nrg-icniot.xml"/> | |||
<reference anchor='oneM2M'> | <reference anchor="Koponen"> | |||
<front> | <front> | |||
<title>oneM2M Functional Architecture TS 0001.</title> | <title>A Data-Oriented (and Beyond) Network Architecture</title> | |||
<author initials='' surname='' fullname=''></author> | <author initials="T." surname="Koponen" fullname="T. Koponen"/> | |||
<date month='' year='' /> | <author initials="M." surname="Chawla" fullname="M. Chawla"/> | |||
</front> | <author initials="B." surname="Chun" fullname="B. Chun"/> | |||
<seriesInfo name='http://www.onem2m.org/technical/published-documents.' | <author initials="A." surname="Ermolinskiy" fullname="A. Ermolinskiy | |||
value='' /> | "/> | |||
</reference> | <author initials="K.H." surname="Kim" fullname="K.H. Kim"/> | |||
<author initials="S." surname="Shenker" fullname="S. Shenker"/> | ||||
<author initials="I." surname="Stoica" fullname="I. Stoica"/> | ||||
<date month="August" year="2007"/> | ||||
</front> | ||||
<seriesInfo name="DOI" value="10.1145/1282380.1282402"/> | ||||
<refcontent>ACM SIGCOMM 2007, pp. 181-192 </refcontent> | ||||
</reference> | ||||
&rfc7252; | <reference anchor="PURSUIT" target="https://www.fp7-pursuit.eu/"> | |||
<front> | ||||
<title>FP7 PURSUIT</title> | ||||
<author /> | ||||
<date/> | ||||
</front> | ||||
</reference> | ||||
<reference anchor='ID.Shelby'> | <reference anchor="SAIL" target="http://www.sail-project.eu/"> | |||
<front> | <front> | |||
<title>CoRE Resource Directory</title> | <title>Scalable and Adaptive Internet Solutions (SAIL)</title> | |||
<author initials='Z.' surname='Shelby' fullname='Z. Shelby'></au | <author/> | |||
thor> | <date/> | |||
<date month='March' year='2017' /> | </front> | |||
</front> | </reference> | |||
<seriesInfo name='draft-ietf-core-resource-directory-10' value='' /> | ||||
</reference> | ||||
<reference anchor='CoRE'> | <reference anchor="NDN" target="http://www.named-data.net"> | |||
<front> | <front> | |||
<title>Constrained RESTful Environments, CoRE</title> | <title>Named Data Networking</title> | |||
<author initials='' surname='' fullname=''></author> | <author/> | |||
<date month='March' year='2013' /> | <date/> | |||
</front> | </front> | |||
<seriesInfo name='https://datatracker.ietf.org/wg/core/charter/' value=' | </reference> | |||
' /> | ||||
</reference> | ||||
<reference anchor='Westphal'> | <reference anchor="CCNx" target="https://wiki.fd.io/view/Cicn"> | |||
<front> | <front> | |||
<title>An IP-based Manifest Architecture for ICN</title> | <title>CICN</title> | |||
<author initials='C.' surname='Westphal' fullname='C. Westphal'> | <author/> | |||
</author> | <date/> | |||
<author initials='E.' surname='Demirors' fullname='E. Demirors'> | </front> | |||
</author> | </reference> | |||
<date month='' year='2015' /> | ||||
</front> | ||||
<seriesInfo name='ACM ICN' value='' /> | ||||
</reference> | ||||
<reference anchor='Mosko'> | <reference anchor="MF" target="http://mobilityfirst.winlab.rutgers.edu"> | |||
<front> | <front> | |||
<title>CCNx Manifest Specification</title> | <title>MobilityFirst Future Internet Architecture Project Overview</ | |||
<author initials='M.' surname='Mosko' fullname='M. Mosko'></author> | title> | |||
<author initials='G.' surname='Scott' fullname='G. Scott'></author> | <author/> | |||
<author initials='I.' surname='Solis' fullname='I. Solis'></author> | <date/> | |||
<author initials='C.' surname='Wood' fullname='C. Wood'></author> | </front> | |||
<date month='July' year='2015' /> | </reference> | |||
</front> | ||||
<seriesInfo name='draft-wood-icnrg-ccnxmanifests-00' value='' /> | ||||
</reference> | ||||
<!-- | <reference anchor="Jung"> | |||
&rfc6830; | <front> | |||
&rfc6833; | <title>IDNet: Beyond All-IP Network</title> | |||
<author initials="" surname="Jung, H. et al." fullname="H. Jung et a | ||||
l."/> | ||||
<date month="October" year="2015"/> | ||||
</front> | ||||
<seriesInfo name="DOI" value="10.4218/etrij.15.2415.0045"/> | ||||
<refcontent>ETRI Journal, Vol. 37, Issue 5</refcontent> | ||||
</reference> | ||||
<reference anchor='RFC6920'> | <reference anchor="SA2-5GLAN" target="http://www.3gpp.org/ftp/tsg_sa/TSG | |||
<front> | _SA/TSGS_82/Docs/SP-181120.zip"> | |||
<title>Naming Things with Hashes</title> | <front> | |||
<author initials='S.' surname='Farrell ' fullname='Stephen Farrell'></ | <title>New WID: 5GS Enhanced support of Vertical and LAN Services</t | |||
author> | itle> | |||
<author initials='D.' surname='Kutscher' fullname='Dirk Kutscher'></au | <author><organization>3GPP</organization></author> | |||
thor> | <date month="December" year="2018"/> | |||
<author initials='C.' surname='Dannewitz' fullname='Christian Dannewit | </front> | |||
z'></author> | <refcontent>TSG SA Meeting #SP-82</refcontent> | |||
<author initials='B.' surname='Ohlman' fullname='Borje Ohlman'></autho | </reference> | |||
r> | ||||
<author initials='A.' surname='Keranen' fullname='Ari Keranen'></autho | ||||
r> | ||||
<author initials='P.' surname='Hallam-Baker' fullname='Phillip Hallam- | ||||
Baker'></author> | ||||
<date month='April' year='2013' /> | ||||
</front> | ||||
<seriesInfo name='RFC6920, DOI 10.17487/RFC6920, https://rfc-editor.org/ | ||||
rfc/rfc6920.txt' value='' /> | ||||
</reference> | ||||
<!-- | <reference anchor="Bari"> | |||
<reference anchor='Zhang'> | <front> | |||
<front> | <title>A Survey of Naming and Routing in Information-Centric Network | |||
<title>Named data networking</title> | s</title> | |||
<author initials='' surname='Zhang, L. et al.' fullname='L. Zhang et al.'></au | <author initials="M.F." surname="Bari" fullname="M.F. Bari"/> | |||
thor> | <author initials="S.R." surname="Chowdhury" fullname="S.R. Chowdhury | |||
<date month='July' year='2014' /> | "/> | |||
</front> | <author initials="R." surname="Ahmed" fullname="R. Ahmed"/> | |||
<seriesInfo name='ACM SIGCOMM Computer Communication Review' value='vol. 44, | <author initials="R." surname="Boutaba" fullname="R. Boutaba"/> | |||
no. 3' /> | <author initials="B." surname="Mathieu" fullname="B. Mathieu"/> | |||
</reference> | <date month="December" year="2012"/> | |||
<reference anchor='Zhang2'> | </front> | |||
<front> | <seriesInfo name="DOI" value="10.1109/MCOM.2012.6384450"/> | |||
<title>A Survey of Mobility Support in Named Data Networking</title> | <refcontent>IEEE Communications Magazine, Vol. 50, No. 12, pp. 44-53</ | |||
<author initials='' surname='Zhang, Y. et al.' fullname='Y. Zhang et a | refcontent> | |||
l.'></author> | </reference> | |||
<date month='' year='2016'/> | ||||
</front> | ||||
<seriesInfo name='IEEE Conference on Computer Communications Workshops' | ||||
value='' /> | ||||
</reference> | ||||
<reference anchor='Dannewitz'> | <reference anchor="Westphal"> | |||
<front> | <front> | |||
<title> Network of Information (NetInf)-An information centric networking ar | <title>An IP-Based Manifest Architecture for ICN</title> | |||
chitecture </title> | <author initials="C." surname="Westphal" fullname="C. Westphal"/> | |||
<author initials='' surname='Dannewitz, C. et al.' fullname='C. Dannewitz et | <author initials="E." surname="Demirors" fullname="E. Demirors"/> | |||
al.' ></author> | <date month="September" year="2015"/> | |||
<date month='April' year='2013' /> | </front> | |||
</front> | <seriesInfo name="DOI" value="10.1145/2810156.2812614"/> | |||
<seriesInfo name='Computer Communications' value='vol. 36, no. 7' /> | <refcontent>ACM-ICN 2015</refcontent> | |||
</reference> | </reference> | |||
<!-- | <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.6920. | |||
<reference anchor='Seskar'> | xml"/> | |||
<front> | ||||
<title>MobilityFirst Future Internet Architecture Project</title> | ||||
<author initials='I.' surname='Seskar' fullname='I. Seskar' ></author> | ||||
<author initials='K.' surname='Nagaraja' fullname='K. Nagaraja' ></author> | ||||
<author initials='S.' surname='Nelson' fullname='S. Nelson' ></author> | ||||
<author initials='D.' surname='Raychaudhuri' fullname='D. Raychaudhurin' >< | ||||
/author> | ||||
<date month='November' year='2011' /> | ||||
</front> | ||||
<seriesInfo name='7th Asian Internet Engineering Conference' value='' /> | ||||
</reference> | ||||
<reference anchor='Dannewitz2'> | <reference anchor="Zhang2"> | |||
<front> | <front> | |||
<title>Hierarchical DHT-based name resolution for Information-Centric Networ | <title>A Survey of Mobility Support in Named Data Networking</title> | |||
ks</title> | <author initials="" surname="Zhang, Y. et al." fullname="Y. Zhang et | |||
<author initials='C.' surname='Dannewitz' fullname='C. Dannewitz' ></author> | al."/> | |||
<author initials='M.' surname='DAmbrosio' fullname='M. DAmbrosio' ></author> | <date month="April" year="2016"/> | |||
<author initials='V.' surname='Vercellone' fullname='V. Vercellone' ></autho | </front> | |||
r> | <seriesInfo name="DOI" value="10.1109/INFCOMW.2016.7562050"/> | |||
<date month='April' year='2013' /> | <refcontent>IEEE Conference on Computer Communications Workshops</refc | |||
</front> | ontent> | |||
<seriesInfo name='Computer Communications' value='vol. 36, no. 7' /> | </reference> | |||
</reference> | ||||
<reference anchor='Vu'> | <reference anchor="Dannewitz"> | |||
<front> | <front> | |||
<title>DMap: A Shared Hosting Scheme for Dynamic Identifier to Locator Mappi | <title> Network of Information (NetInf) - An information-centric net | |||
ng in the Global Internet </title> | working architecture </title> | |||
<author initials='' surname='Vu, T. et al.' fullname='T. Vu et al' ></author | <author initials="" surname="Dannewitz, C. et al." fullname="C. Dann | |||
> | ewitz et al."/> | |||
<date month='' year='2012' /> | <date month="April" year="2013"/> | |||
</front> | </front> | |||
<seriesInfo name='IEEE 32nd International Conference on Distributed Computin | <seriesInfo name="DOI" value="10.1016/j.comcom.2013.01.009"/> | |||
g Systems' value='' /> | <refcontent>Computer Communications, Vol. 36, Issue 7</refcontent> | |||
</reference> | </reference> | |||
<reference anchor='Hong'> | <xi:include href="https://datatracker.ietf.org/doc/bibxml3/reference.I-D.ravi-ic | |||
<front> | nrg-ccn-forwarding-label.xml"/> | |||
<title>Demonstrating a Scalable Name Resolution System for Information-Centr | ||||
ic Networking </title> | ||||
<author initials='J.' surname='Hong' fullname='J. Hong' ></author> | ||||
<author initials='W.' surname='Chun' fullname='W. Chun' ></author> | ||||
<author initials='H.' surname='Jung' fullname='H. Jung' ></author> | ||||
<date month='September' year='2015' /> | ||||
</front> | ||||
<seriesInfo name='ACM ICN' value='' /> | ||||
</reference> | ||||
<reference anchor='Ravindran'> | ||||
<front> | ||||
<title>Forwarding-Label support in CCN Protocol </title> | ||||
<author initials='' surname='Ravindran, R. et al.' fullname='R. Ravindran et | ||||
al' ></author> | ||||
<date month='March' year='2018' /> | ||||
</front> | ||||
<seriesInfo name='draft-ravi-icnrg-ccn-forwarding-label-02' value='' /> | ||||
</reference> | ||||
<reference anchor='Afanasyev'> | <reference anchor="Afanasyev"> | |||
<front> | <front> | |||
<title>SNAMP: Secure Namespace Mapping to Scale NDN Forwarding </title> | <title>SNAMP: Secure Namespace Mapping to Scale NDN Forwarding </tit | |||
<author initials='' surname='Afanasyev, A. et al.' fullname='A. Afanasyev et | le> | |||
al' ></author> | <author initials="" surname="Afanasyev, A. et al." fullname="A. Afan | |||
<date month='April' year='2015' /> | asyev et al."/> | |||
</front> | <date month="April" year="2015"/> | |||
<seriesInfo name='IEEE Global Internet Symposium' value='' /> | </front> | |||
</reference> | <seriesInfo name="DOI" value="10.1109/INFCOMW.2015.7179398"/> | |||
<refcontent>2015 IEEE Conference on Computer Communications Workshops | ||||
</refcontent> | ||||
</reference> | ||||
<reference anchor='Mosko2'> | <reference anchor="Mosko2" target="https://datatracker.ietf.org/meeting/ | |||
<front> | interim-2016-icnrg-01/materials/slides-interim-2016-icnrg-1-7.pdf"> | |||
<title>Nameless Objects </title> | <front> | |||
<author initials='M.' surname='Mosko' fullname='M. Mosko' ></author> | <title>Nameless Objects </title> | |||
<date month='January' year='2016' /> | <author initials="M." surname="Mosko" fullname="M. Mosko"/> | |||
</front> | <date month="January" year="2016"/> | |||
<seriesInfo name='IRTF ICNRG' value='' /> | </front> | |||
</reference> | <refcontent>IRTF ICNRG</refcontent> | |||
</reference> | ||||
<reference anchor='Bayhan'> | <reference anchor="Bayhan"> | |||
<front> | <front> | |||
<title>On Content Indexing for Off-Path Caching in Information-Centric Ne | <title>On Content Indexing for Off-Path Caching in Information-Centr | |||
tworks </title> | ic Networks </title> | |||
<author initials='' surname='Bayhan, S. et al.' fullname='S. Bayhan et al | <author initials="" surname="Bayhan, S. et al." fullname="S. Bayhan | |||
' ></author> | et al."/> | |||
<date month='September' year='2016' /> | <date month="September" year="2016"/> | |||
</front> | </front> | |||
<seriesInfo name='ACM ICN' value='' /> | <seriesInfo name="DOI" value="10.1145/2984356.2984372"/> | |||
</reference> | <refcontent>ACM-ICN 2016</refcontent> | |||
</reference> | ||||
<reference anchor='FLIC'> | <xi:include href="https://datatracker.ietf.org/doc/bibxml3/reference.I-D.irtf-ic | |||
<front> | nrg-flic.xml"/> | |||
<title>File-Like ICN Collection (FLIC) </title> | ||||
<author initials='' surname='Tschudin, C. et al.' fullname='C. Tschudin e | ||||
t al' ></author> | ||||
<date month='November' year='2019' /> | ||||
</front> | ||||
<seriesInfo name='draft-irtf-icnrg-flic-02' value='' /> | ||||
</reference> | ||||
<reference anchor='NEO'> | <reference anchor="NEO"> | |||
<front> | <front> | |||
<title>A DNS-based information-centric network architecture open to multipl | <title>A DNS-based information-centric network architecture open to | |||
e protocols for transfer of data objects </title> | multiple protocols for transfer of data objects </title> | |||
<author initials='A.' surname='Eriksson' fullname='A. Eriksson' ></author> | <author initials="A." surname="Eriksson" fullname="A. Eriksson"/> | |||
<author initials='A.' surname='M. Malik' fullname='A. M. Malik' ></author> | <author initials="A.M." surname="Malik" fullname="A.M. Malik"/> | |||
<date month='' year='2018' /> | <date month="February" year="2018"/> | |||
</front> | </front> | |||
<seriesInfo name='21st Conference on Innovation in Clouds, Internet and Net | <seriesInfo name="DOI" value="10.1109/ICIN.2018.8401595"/> | |||
works and Workshops (ICIN),' value='pp. 1-8' /> | <refcontent>21st Conference on Innovation in Clouds, Internet and Netw | |||
</reference> | orks and Workshops (ICIN), pp. 1-8</refcontent> | |||
</reference> | ||||
<reference anchor='NRSarch'> | <xi:include href="https://datatracker.ietf.org/doc/bibxml3/reference.I-D.irtf-ic | |||
<front> | nrg-nrsarch-considerations.xml"/> | |||
<title>Architectural Considerations of ICN using Name Resolution Service</t | ||||
itle> | ||||
<author initials='' surname='Hong, J. et al.' fullname='J. Hong et al' ></a | ||||
uthor> | ||||
<date month='February' year='2021' /> | ||||
</front> | ||||
<seriesInfo name='draft-irtf-icnrg-nrsarch-considerations-06' value='' /> | ||||
</reference> | ||||
<reference anchor='RFC9064'> | <xi:include href="https://xml2rfc.ietf.org/public/rfc/bibxml/reference.RFC.9064. | |||
<front> | xml"/> | |||
<title>Considerations in the development of a QoS Architecture for CCNx-lik | ||||
e ICN protocols</title> | ||||
<author initials='D.' surname='Oran' fullname='D. Oran'></author> | ||||
<date month='June' year='2021' /> | ||||
</front> | ||||
<seriesInfo name='RFC9064, https://datatracker.ietf.org/doc/rfc9064/' value | ||||
='' /> | ||||
</reference> | ||||
</references> | ||||
</references> | </references> | |||
<section anchor="Acknowledgments" numbered="false" toc="include"> | ||||
<section anchor="Acknowledgments" title="Acknowledgements" numbered="false" | <name>Acknowledgements</name> | |||
toc="include"> | <t> | |||
The authors would like to thank <contact fullname="Dave Oran"/>, <cont | ||||
<t> | act fullname="Dirk Kutscher"/>, <contact fullname="Ved Kafle"/>, <contact fullna | |||
The authors would like to thank Dave Oran, Dirk Kutscher, Ved Kafle, | me="Vincent Roca"/>, <contact fullname="Marie-Jose Montpetit"/>, <contact fullna | |||
Vincent Roca, Marie-Jose Montpetit, Stephen Farrell, Mirja Kuhlewind, | me="Stephen Farrell"/>, <contact fullname="Mirja Kühlewind"/>, | |||
and Colin Perkins for very useful reviews, comments and improvement | and <contact fullname="Colin Perkins"/> for very useful reviews, comme | |||
on the document. | nts, and improvements | |||
</t> | to the document. | |||
</t> | ||||
</section> | </section> | |||
</back> | ||||
</back> | </rfc> | |||
</rfc> <!-- | ||||
< </reference> | ||||
title>Networking named content</title> <sInfo name='IEEE Network' va | ||||
lue='vol. 30, no. 2' /> | ||||
</reference> | ||||
&id.draft-winter-energy-efficient-internet; | ||||
</reference> | ||||
&i | ||||
d.draft-cheshire-edns0-owner-option; | ||||
<reference anchor='ITU'> | ||||
<front> | ||||
<title>Resolution 73 - Information and communication technologies an | ||||
d climate change</title> | ||||
<author></author> | ||||
<date month='October' year='2008' /> | ||||
</front> | ||||
</reference> | ||||
<reference anchor='EPC'> | ||||
<front> | ||||
<title>The Case for Energy-Proportional Computing</title> | ||||
<author initials='L.' surname='Barroso' fullname='Luiz Andre Barroso | ||||
'></author> | ||||
<author initials='U.' surname='Holzle' fullname='Urs Holzle'></autho | ||||
r> | ||||
<date month='December' year='2007'/> | ||||
</front> | ||||
<seriesInfo name='Proc. IEEE International Conference on Network Protoco | ||||
ls (ICNP)' value=''/> | ||||
</reference> | ||||
<reference anchor='GreenSurvey'> | ||||
<front> | ||||
<title>A survey of green networking research</title> | ||||
<author initials='A.P.' surname='Bianzino' fullname='Aruna Prem Bian | ||||
zino'></author> | ||||
<author initials='C.' surname='Chaudet' fullname='Claude Chaudet'></ | ||||
author> | ||||
<author initials='D.' surname='Rossi' fullname='Dario Rossi'></autho | ||||
r> | ||||
<author initials='J.-L.' surname='Rougier' fullname='Jean-Louis Roug | ||||
ier'></author> <date month='' year='2012' /> | ||||
</front> | ||||
<seriesInfo name='IEEE Communications Surveys Tutorials' value='' /> | ||||
</reference> | ||||
<reference anchor='EEE'> | ||||
<front> | ||||
<title>802.3az-2010</title> | ||||
<author></author> | ||||
<date month='' year='2010' /> | ||||
</front> | ||||
<seriesInfo name='IEEE std' value='' /> | ||||
</reference> | ||||
<reference anchor='PROXZZZY'> | ||||
<front> | ||||
<title>ProxZZZy for sleeping hosts</title> | ||||
<author></author> | ||||
<date month='June' year='2012' /> | ||||
</front> | ||||
<seriesInfo name='ECMA International' value='ECMA-393' /> | ||||
</reference> | ||||
<reference anchor='EEEC'> | ||||
<front> | ||||
<title>Improving the Energy Efficiency of Ethernet-Connected: | ||||
A Proposal for Proxying</title> | ||||
<author initials='B.' surname='Nordman' fullname='Bbuce Nordman'></a | ||||
uthor> | ||||
<author initials='K.' surname='Christensen' fullname='Ken Christense | ||||
n'></author> | ||||
<date month='September' year='2007' /> | ||||
</front> | ||||
<seriesInfo name='Ethernet Alliance' value='' /> | ||||
</reference> | ||||
<reference anchor='NCP'> | ||||
<front> | ||||
<title>A Network Connection Proxy to Enable Hosts to Sleep and Save | ||||
Energy</title> | ||||
<author initials='M.' surname='Jimeno' fullname='M. Jimeno'></author | ||||
> | ||||
<author initials='K.' surname='Christensen' fullname='K. Christensen | ||||
'></author> | ||||
<author initials='B.' surname='Nordman' fullname='B. Nordman'></autho | ||||
r> | ||||
<date month='' year='2008' /> | ||||
</front> | ||||
<seriesInfo name='Proc. IEEE Internat. Performance Computing and Communi | ||||
cations Conf' value='' /> | ||||
</reference> | ||||
<reference anchor='SKILL'> | ||||
<front> | ||||
<title>Skilled in the Art of Being Idle: Reducing Energy Waste in Ne | ||||
tworked Systems</title> | ||||
<author initials='S.' surname='Nedevschi' fullname='S. Nedevschi'></ | ||||
author> | ||||
<author initials='J.' surname='Liu' fullname='J. Liu'></author> | ||||
<author initials='B.' surname='Nordman' fullname='B. Nord | ||||
man'></author> | ||||
<author initials='S.' surname='Ratnasamy' fullname='S. Ratnas | ||||
amy'></author> | ||||
<author initials='N.' surname='Taft' fullname='N. Taft'>< | ||||
/author> | ||||
<date month='' year='2009' /> | ||||
</front> | ||||
<seriesInfo name='Proc. USENIX Symposium on Networked Systems Design and | ||||
Implementation' value='' /> | ||||
</reference> | ||||
--> | ||||
End of changes. 173 change blocks. | ||||
1526 lines changed or deleted | 860 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ |