NDN-NP: Named Data Networking First Phase - Summary
The main goal of this collaborative project (one of the four Future Internet Architecture Awards) is research, development, and testbed deployment of a new Internet architecture that replaces IP with a network layer that routes directly on content names. For more information see http://www.named-data.net/
Principal Investigators: Dmitri Krioukov kc claffy
Funding source: CNS-1039646 Period of performance: September 1, 2010 - August 31, 2014.
Researchers from 10 campuses participate in the NDN effort. The project includes the following tasks:
Year I: A running system developed as an overlay testbed among project sites
Task Number | Task Type | Description |
---|---|---|
1 | Core Node | Implement basic NDN libraries, forwarding, and trust model; Bootstrap via rendezvous; resolve NAT traversal; Run applications on top of NDN. |
2 | Routing Forwarding | Extend OSPF and BGP to route name prefixes with simple multipath capability; Investigate relationship between name space structure, router topology, and hierarchical greedy routing efficiency. Evaluate various name lookup schemes, cache management & replacement policies; initial testbed implementations. |
3 | Application | Assess key contributors of architecture to each driver; Develop naming schemas and trust models. Port mainstream app. components to NDN libraries. Specify and begin implementation of core services for advanced apps., and compare with existing IP-based solutions. |
4 | Security | Design user-friendly trust models; Design algorithm for optimizing efficiency and privacy; Design routing security model and attack remediation schemes. |
5 | Theory | Investigate performance measures and multi-source multicast coding techniques for NDN. |
6 | Evaluation | Build instrumentation to support testbed measurement and monitoring of cache and path performance parameters, flow control, and delay. |
7 | Education | Add NDN introductory material into existing courses; Develop conference tutorial. |
Year II: Experiments with advanced applications at larger scale
Task Number | Task Type | Description |
---|---|---|
8 | Core Node | Implement ISP-name based routing; Incorporate new naming conventions, trust models, and routing message authentications. |
9 | Routing Forwarding | Design and evaluate ISP-name based routing & advanced multipath forwarding. Design hierarchical greedy routing with global coordinate assignment. Design and implement hybrid TCAM solution and Bloom-filter accelerated solution. |
10 | Application | Initial evaluation and performance comparisons, considering programming effort, host resource requirements, energy consumption, entropy, max. throughput, and overhead; Incorporate architecture refinements from first year into services and basic applications; Iterate on trust, identity and naming models and implementations; Enumerate architectural changes that would improve application support; Select and begin prototyping application instances. |
11 | Security | Packaged generic trust model; Deploy higher-efficiency authentication and privacy algorithms; Implement and test attack remediation strategies. |
12 | Theory | Investigate tradeoffs between wires and storage for optimal communication. |
13 | Evaluation | Use instrumentation developed in Year 1 to collect data on testbed; compare to simulations and theoretical models. |
14 | Education | Start offering NDN-specific courses at all campuses; submit and distribute conference tutorial;design and launch internship program. |
Year III: Final system release
Task Number | Task Type | Description |
---|---|---|
15 | Core Node | Implement hierarchical greedy routing, advanced trust models, authentication and privacy algorithms, attack resistance schemes. |
16 | Routing Forwarding | Design hierarchical greedy routing with distributed coordinate assignment. Develop and deploy final release of fast name lookup and cache management solutions on available testbeds. |
17 | Application | Continue advanced app. development & deployment with end-users; Incorporate performance enhancements based on architecture refinements; Iterate on trust, identity and naming models and implementations. Improve tools for networking monitoring and system authoring/management. Scale up system heterogeneity, number of users, and geographic reach. |
18 | Security | Trust model in support of new applications; Optimize algorithms; evaluate attack resistance. |
19 | Theory | Investigate the capacity region of rates and macroscopic laws governing NDN capacity. |
20 | Evaluation | Testbed experiments to evaluate performance of applications, attack simulations, privacy tools. Design, perform, and publish anonymized results of surveys of end users and developers of NDN software. |
21 | Education | Second round of NDN-specific graduate courses; Integrate student feedback into internship program. |