Skip to Content
[CAIDA - Center for Applied Internet Data Analysis logo]
Center for Applied Internet Data Analysis > funding : ndn-fia : summary.xml
Named Data Networking (NDN) First Phase
Sponsored by:
National Science Foundation (NSF)

The main goal of this collaborative project (one of the four Future Internet Architecture Awards) is research, development, and testbed deployment of a new Internet architecture that replaces IP with a network layer that routes directly on content names. For more information see

Funding source: NSF CNS-1039646. Period of performance: September 1, 2010 - August 31, 2014.

|   Impact Report    Project Summary    Proposal   |

Researchers from 10 campuses participate in the NDN effort. The project includes the following tasks:

Year I: A running system developed as an overlay testbed among project sites

Task NumberTask TypeDescription
1Core NodeImplement basic NDN libraries, forwarding, and trust model; Bootstrap via rendezvous; resolve NAT traversal; Run applications on top of NDN.
2Routing ForwardingExtend OSPF and BGP to route name prefixes with simple multipath capability; Investigate relationship between name space structure, router topology, and hierarchical greedy routing efficiency. Evaluate various name lookup schemes, cache management & replacement policies; initial testbed implementations.
3Application Assess key contributors of architecture to each driver; Develop naming schemas and trust models. Port mainstream app. components to NDN libraries. Specify and begin implementation of core services for advanced apps., and compare with existing IP-based solutions.
4Security Design user-friendly trust models; Design algorithm for optimizing efficiency and privacy; Design routing security model and attack remediation schemes.
5TheoryInvestigate performance measures and multi-source multicast coding techniques for NDN.
6Evaluation Build instrumentation to support testbed measurement and monitoring of cache and path performance parameters, flow control, and delay.
7Education Add NDN introductory material into existing courses; Develop conference tutorial.

Year II: Experiments with advanced applications at larger scale

Task NumberTask TypeDescription
8Core NodeImplement ISP-name based routing; Incorporate new naming conventions, trust models, and routing message authentications.
9Routing ForwardingDesign and evaluate ISP-name based routing & advanced multipath forwarding. Design hierarchical greedy routing with global coordinate assignment. Design and implement hybrid TCAM solution and Bloom-filter accelerated solution.
10Application Initial evaluation and performance comparisons, considering programming effort, host resource requirements, energy consumption, entropy, max. throughput, and overhead; Incorporate architecture refinements from first year into services and basic applications; Iterate on trust, identity and naming models and implementations; Enumerate architectural changes that would improve application support; Select and begin prototyping application instances.
11Security Packaged generic trust model; Deploy higher-efficiency authentication and privacy algorithms; Implement and test attack remediation strategies.
12Theory Investigate tradeoffs between wires and storage for optimal communication.
13Evaluation Use instrumentation developed in Year 1 to collect data on testbed; compare to simulations and theoretical models.
14Education Start offering NDN-specific courses at all campuses; submit and distribute conference tutorial;design and launch internship program.

Year III: Final system release

Task NumberTask TypeDescription
15Core NodeImplement hierarchical greedy routing, advanced trust models, authentication and privacy algorithms, attack resistance schemes.
16Routing ForwardingDesign hierarchical greedy routing with distributed coordinate assignment. Develop and deploy final release of fast name lookup and cache management solutions on available testbeds.
17Application Continue advanced app. development & deployment with end-users; Incorporate performance enhancements based on architecture refinements; Iterate on trust, identity and naming models and implementations. Improve tools for networking monitoring and system authoring/management. Scale up system heterogeneity, number of users, and geographic reach.
18Security Trust model in support of new applications; Optimize algorithms; evaluate attack resistance.
19Theory Investigate the capacity region of rates and macroscopic laws governing NDN capacity.
20Evaluation Testbed experiments to evaluate performance of applications, attack simulations, privacy tools. Design, perform, and publish anonymized results of surveys of end users and developers of NDN software.
21EducationSecond round of NDN-specific graduate courses; Integrate student feedback into internship program.

  Last Modified: Tue Oct-13-2020 22:21:55 UTC
  Page URL: