Proceedings of the 2007 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications 2007
DOI: 10.1145/1282380.1282402
|View full text |Cite
|
Sign up to set email alerts
|

A data-oriented (and beyond) network architecture

Abstract: The Internet has evolved greatly from its original incarnation. For instance, the vast majority of current Internet usage is data retrieval and service access, whereas the architecture was designed around host-to-host applications such as telnet and ftp. Moreover, the original Internet was a purely transparent carrier of packets, but now the various network stakeholders use middleboxes to improve security and accelerate applications. To adapt to these changes, we propose the Data-Oriented Network Architecture … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

2
672
0
9

Year Published

2011
2011
2017
2017

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 945 publications
(702 citation statements)
references
References 37 publications
2
672
0
9
Order By: Relevance
“…A user's content request can then be served by any of the network element having a copy of the requested content. Such information retrieval mechanism follows a publish-subscribe approach though different implementations are found in different ICN architectures (e.g., Register and Find primitives are used in [15], Register and Interest in [13] and Publish and Consume in [16], [17]). Here, we take such on-path caching mechanism as the starting point of our proposal.…”
Section: Providing Information Resilience In Icn a Design Ratiomentioning
confidence: 99%
“…A user's content request can then be served by any of the network element having a copy of the requested content. Such information retrieval mechanism follows a publish-subscribe approach though different implementations are found in different ICN architectures (e.g., Register and Find primitives are used in [15], Register and Interest in [13] and Publish and Consume in [16], [17]). Here, we take such on-path caching mechanism as the starting point of our proposal.…”
Section: Providing Information Resilience In Icn a Design Ratiomentioning
confidence: 99%
“…Nick-names used by proprietary applications (e.g., Skype) are memorable and decentralized. So-called self-certifying names [4,14] are secure and decentralized.…”
Section: Content-namingmentioning
confidence: 99%
“…For instance, in [4] the authors propose that a publisher P of a content may autonomously label the content as L and the resulting self-certified name is the Digest(Pubkey P ):L, where Digest(Pubkey P ) is a digest of the public key used by the publisher to sign the data. If that the publisher ensures the uniqueness of label L among her published contents, a self-certifying naming schemes is secure and decentralized.…”
Section: Content-namingmentioning
confidence: 99%
See 2 more Smart Citations