skip to main content
research-article
Free Access

Networking named content

Published:01 January 2012Publication History
Skip Abstract Section

Abstract

Current network use is dominated by content distribution and retrieval yet current networking protocols are designed for conversations between hosts. Accessing content and services requires mapping from the what that users care about to the network's where. We present Content-Centric Networking (CCN) which uses content chunks as a primitive---decoupling location from identity, security and access, and retrieving chunks of content by name. Using new approaches to routing named content, derived from IP, CCN simultaneously achieves scalability, security, and performance. We describe our implementation of the architecture's basic features and demonstrate its performance and resilience with secure file downloads and VoIP calls.

References

  1. Project CCNx#8482;. http://www.ccnx.org, Sep. 2009.Google ScholarGoogle Scholar
  2. Abadi, M. On SDSI's linked local name spaces. J. Comput. Secur. 6, 1--2 (Oct. 1998). 3--21. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Adamson, B., Bormann, C., Handley, M., Macker, J. Multicast Negative-Acknowledgement (NACK) Building Blocks. IETF, Nov. 2008. RFC 5401.Google ScholarGoogle Scholar
  4. Clarke, I., Sandberg, O., Wiley, B., Hong, T.W. Freenet: A Distributed anonymous information storage and retrieval system. In Lecture Notes in Computer Science 2009 (2001), 46. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Ellison, C.M., Frantz, B., Lampson, B., Rivest, R., Thomas, B.M., Ylonen, T. SPKI Certificate Theory, Sep. 1999. RFC2693. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Fu, K., Kaashoek, M.F., Mazieres, D. Fast and secure distributed read-only file system. ACM Trans. Comput. Syst. 20, 1 (2002), 1--24. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Gantz, J.F. et al. IDC---The expanding digital universe: A forecast of worldwide information growth through 2010. Technical report, Mar. 2007.Google ScholarGoogle Scholar
  8. Jacobson, V. Congestion avoidance and control. In SIGCOMM, 1988. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Jacobson, V., Braden, R., Borman, D. TCP Extensions for High Performance. IETF---Network Working Group, The Internet Society, May 1992. RFC 1323. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Jacobson, V., Smetters, D.K., Briggs, N., Plass, M., Stewart, P., Thornton, J.D., Braynard, R. VoCCN: Voice-over contentcentric networks. In ReArch, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Jacobson, V., Smetters, D.K., Thornton, J.D., Plass, M., Briggs, N., Braynard, R. Networking named content. In CoNext, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Koponen, T., Chawla, M., Chun, B.-G., Ermolinskiy, A., Kim, K.H., Shenker, S., Stoica, I. A data-oriented (and beyond) network architecture. In SIGCOMM, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Kubiatowicz, J. et al. OceanStore: An architecture for global-scale persistent storage. SIGPLAN Not. 35, 11 (2000), 190--201. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Mazières, D., Kaminsky, M., Kaashoek, M.F., Witchel, E. Separating key management from file system security. In SOSP, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Moskowitz, R., Nikander, P. Host Identity Protocol Architecture. IETF---Network Working Group, May 2006. RFC 4423.Google ScholarGoogle Scholar
  16. Osterweil, E., Massey, D., Tsendjav, B., Zhang, B., Zhang, L. Security through publicity. In HOTSEC '06, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Popescu, B.C., van Steen, M., Crispo, B., Tanenbaum, A.S., Sacha, J., Kuz, I. Securely replicated web documents. In IPDPS, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Rivest, R.L., Lampson, B. SDSI---A simple distributed security infrastructure. Technical report, MIT, 1996.Google ScholarGoogle Scholar
  19. Smetters, D.K., Jacobson, V. Securing network content., PARC Technical Report, Oct. 2009.Google ScholarGoogle Scholar
  20. Wendlandt, D., Andersen, D., Perrig, A. Perspectives: Improving SSH-style host authentication with multi-path probing. In USENIX, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Networking named content

      Recommendations

      Reviews

      Amos O Olagunju

      Computer users often share and procure resources over the Internet. Unfortunately, the construction philosophy [1] and design [2] of today's global computer network focuses on the use of addresses and the transmission control protocol (TCP) to exchange data and share resources among host machines. Arguing that users care about having content accessible via the Internet and not the locations of the host machines, Jacobson et al. suggest content-centric networking (CCN) for content-based packet transmission. CCN consists of two types of packets. The customer uses an interest packet to request a resource from any reachable interface on the Internet. Any node that receives the request and has data that fulfills the query can reply with a data packet. CCN uses content names to connect interest and data packets, which enables multiple nodes to share broadcasts of identical content over a transmission medium. CCN looks up the name of each arriving packet at a node and performs the appropriate action. As the authors explain, "the core CCN packet-forwarding engine has three main data structures": a list of outgoing nodes supports the querying of multiple data sources in parallel; a buffer memory of the arriving data packets exploits the probability of data sharing, which reduces downstream delay and the demand for upstream bandwidth; and a table tracks the interests dispatched upstream toward content sources to enable the return of data downstream to requesting nodes. CCN maintains local communication and a flow balance of packets at each hop. The authors discuss the implementation of and performance results from a prototype CCN system. The prototype system's data transfer efficiency was analogous to that of TCP. It remained constantly effective in distributing multiple copies of a large data file over a network. Voice over Internet protocol (VoIP) on top of the prototype system showed no packet lost due to link connection failures. The CCN paradigm represents a remarkable call for a shift away from the traditional TCP/IP. CCN is different from the traditional IP in its optimal strategic choice among alternative multiple connections in the dynamic Internet environment. The authors cleverly design a content-based security system to replace the IP network stack. The system offers protection of and trust in the content for retrieval over the Internet. In the model, private content can be encrypted and all content is digitally signed. Moreover, all routing and policy information can be authenticated to help combat network attacks such as spoofing, flooding, and tampering. With today's ever-increasing activities over social Web sites, the content distribution effectiveness of CCN is valuable. Online Computing Reviews Service

      Access critical reviews of Computing literature here

      Become a reviewer for Computing Reviews.

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image Communications of the ACM
        Communications of the ACM  Volume 55, Issue 1
        January 2012
        119 pages
        ISSN:0001-0782
        EISSN:1557-7317
        DOI:10.1145/2063176
        Issue’s Table of Contents

        Copyright © 2012 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 1 January 2012

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
        • Popular
        • Refereed

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      HTML Format

      View this article in HTML Format .

      View HTML Format