NDN-NP: Named Data Networking First Phase - Summary

The main goal of this collaborative project (one of the four Future Internet Architecture Awards) is research, development, and testbed deployment of a new Internet architecture that replaces IP with a network layer that routes directly on content names. For more information see http://www.named-data.net/

Sponsored by:
National Science Foundation (NSF)

Principal Investigators: Dmitri Krioukov kc claffy

Funding source:  CNS-1039646 Period of performance: September 1, 2010 - August 31, 2014.


Researchers from 10 campuses participate in the NDN effort. The project includes the following tasks:

Year I: A running system developed as an overlay testbed among project sites

Task Number Task Type Description
1 Core Node Implement basic NDN libraries, forwarding, and trust model; Bootstrap via rendezvous; resolve NAT traversal; Run applications on top of NDN.
2 Routing Forwarding Extend OSPF and BGP to route name prefixes with simple multipath capability; Investigate relationship between name space structure, router topology, and hierarchical greedy routing efficiency. Evaluate various name lookup schemes, cache management & replacement policies; initial testbed implementations.
3 Application Assess key contributors of architecture to each driver; Develop naming schemas and trust models. Port mainstream app. components to NDN libraries. Specify and begin implementation of core services for advanced apps., and compare with existing IP-based solutions.
4 Security Design user-friendly trust models; Design algorithm for optimizing efficiency and privacy; Design routing security model and attack remediation schemes.
5 Theory Investigate performance measures and multi-source multicast coding techniques for NDN.
6 Evaluation Build instrumentation to support testbed measurement and monitoring of cache and path performance parameters, flow control, and delay.
7 Education Add NDN introductory material into existing courses; Develop conference tutorial.

Year II: Experiments with advanced applications at larger scale

Task Number Task Type Description
8 Core Node Implement ISP-name based routing; Incorporate new naming conventions, trust models, and routing message authentications.
9 Routing Forwarding Design and evaluate ISP-name based routing & advanced multipath forwarding. Design hierarchical greedy routing with global coordinate assignment. Design and implement hybrid TCAM solution and Bloom-filter accelerated solution.
10 Application Initial evaluation and performance comparisons, considering programming effort, host resource requirements, energy consumption, entropy, max. throughput, and overhead; Incorporate architecture refinements from first year into services and basic applications; Iterate on trust, identity and naming models and implementations; Enumerate architectural changes that would improve application support; Select and begin prototyping application instances.
11 Security Packaged generic trust model; Deploy higher-efficiency authentication and privacy algorithms; Implement and test attack remediation strategies.
12 Theory Investigate tradeoffs between wires and storage for optimal communication.
13 Evaluation Use instrumentation developed in Year 1 to collect data on testbed; compare to simulations and theoretical models.
14 Education Start offering NDN-specific courses at all campuses; submit and distribute conference tutorial;design and launch internship program.

Year III: Final system release

Task Number Task Type Description
15 Core Node Implement hierarchical greedy routing, advanced trust models, authentication and privacy algorithms, attack resistance schemes.
16 Routing Forwarding Design hierarchical greedy routing with distributed coordinate assignment. Develop and deploy final release of fast name lookup and cache management solutions on available testbeds.
17 Application Continue advanced app. development & deployment with end-users; Incorporate performance enhancements based on architecture refinements; Iterate on trust, identity and naming models and implementations. Improve tools for networking monitoring and system authoring/management. Scale up system heterogeneity, number of users, and geographic reach.
18 Security Trust model in support of new applications; Optimize algorithms; evaluate attack resistance.
19 Theory Investigate the capacity region of rates and macroscopic laws governing NDN capacity.
20 Evaluation Testbed experiments to evaluate performance of applications, attack simulations, privacy tools. Design, perform, and publish anonymized results of surveys of end users and developers of NDN software.
21 Education Second round of NDN-specific graduate courses; Integrate student feedback into internship program.

Published