NDN-NP: Named Data Networking First Phase - Summary
The main goal of this collaborative project (one of the four Future Internet Architecture Awards) is research, development, and testbed deployment of a new Internet architecture that replaces IP with a network layer that routes directly on content names. For more information see http://www.named-data.net/
Principal Investigators: Dmitri Krioukov kc claffy
Funding source: CNS-1039646 Period of performance: September 1, 2010 - August 31, 2014.
Researchers from 10 campuses participate in the NDN effort. The project includes the following tasks:
Year I: A running system developed as an overlay testbed among project sites
|Implement basic NDN libraries, forwarding, and trust model; Bootstrap via rendezvous; resolve NAT traversal; Run applications on top of NDN.
|Extend OSPF and BGP to route name prefixes with simple multipath capability; Investigate relationship between name space structure, router topology, and hierarchical greedy routing efficiency. Evaluate various name lookup schemes, cache management & replacement policies; initial testbed implementations.
|Assess key contributors of architecture to each driver; Develop naming schemas and trust models. Port mainstream app. components to NDN libraries. Specify and begin implementation of core services for advanced apps., and compare with existing IP-based solutions.
|Design user-friendly trust models; Design algorithm for optimizing efficiency and privacy; Design routing security model and attack remediation schemes.
|Investigate performance measures and multi-source multicast coding techniques for NDN.
|Build instrumentation to support testbed measurement and monitoring of cache and path performance parameters, flow control, and delay.
|Add NDN introductory material into existing courses; Develop conference tutorial.
Year II: Experiments with advanced applications at larger scale
|Implement ISP-name based routing; Incorporate new naming conventions, trust models, and routing message authentications.
|Design and evaluate ISP-name based routing & advanced multipath forwarding. Design hierarchical greedy routing with global coordinate assignment. Design and implement hybrid TCAM solution and Bloom-filter accelerated solution.
|Initial evaluation and performance comparisons, considering programming effort, host resource requirements, energy consumption, entropy, max. throughput, and overhead; Incorporate architecture refinements from first year into services and basic applications; Iterate on trust, identity and naming models and implementations; Enumerate architectural changes that would improve application support; Select and begin prototyping application instances.
|Packaged generic trust model; Deploy higher-efficiency authentication and privacy algorithms; Implement and test attack remediation strategies.
|Investigate tradeoffs between wires and storage for optimal communication.
|Use instrumentation developed in Year 1 to collect data on testbed; compare to simulations and theoretical models.
|Start offering NDN-specific courses at all campuses; submit and distribute conference tutorial;design and launch internship program.
Year III: Final system release
|Implement hierarchical greedy routing, advanced trust models, authentication and privacy algorithms, attack resistance schemes.
|Design hierarchical greedy routing with distributed coordinate assignment. Develop and deploy final release of fast name lookup and cache management solutions on available testbeds.
|Continue advanced app. development & deployment with end-users; Incorporate performance enhancements based on architecture refinements; Iterate on trust, identity and naming models and implementations. Improve tools for networking monitoring and system authoring/management. Scale up system heterogeneity, number of users, and geographic reach.
|Trust model in support of new applications; Optimize algorithms; evaluate attack resistance.
|Investigate the capacity region of rates and macroscopic laws governing NDN capacity.
|Testbed experiments to evaluate performance of applications, attack simulations, privacy tools. Design, perform, and publish anonymized results of surveys of end users and developers of NDN software.
|Second round of NDN-specific graduate courses; Integrate student feedback into internship program.