skip to main content
10.1145/1282380.1282402acmconferencesArticle/Chapter ViewAbstractPublication PagescommConference Proceedingsconference-collections
Article
Free access

A data-oriented (and beyond) network architecture

Published: 27 August 2007 Publication History

Abstract

The Internet has evolved greatly from its original incarnation. For instance, the vast majority of current Internet usage is data retrieval and service access, whereas the architecture was designed around host-to-host applications such as telnet and ftp. Moreover, the original Internet was a purely transparent carrier of packets, but now the various network stakeholders use middleboxes to improve security and accelerate applications. To adapt to these changes, we propose the Data-Oriented Network Architecture (DONA), which involves a clean-slate redesign of Internet naming and name resolution.

References

[1]
Abilene. http://abilene.internet2.edu.
[2]
H. Balakrishnan, K. Lakshminarayanan, S. Ratnasamy, S. Shenker, I. Stoica, and M. Walfish. A Layered Naming Architecture for the Internet. In Proc. of ACM SIGCOMM '04, pages 343--352, Portland, OR, USA, Aug. 2004.
[3]
M. Blumenthal and D. Clark. Rethinking the design of the Internet: The End-to-End arguments vs. The Brave New World. ACM TOIT, pages 70--109, 2001.
[4]
M. Caesar, D. Caldwell, N. Feamster, J. Rexford, A. Shaikh, and K. van der Merwe. Design and Implementation of a Routing Control Platform. In Proc. of NSDI '05, pages 15--28, Boston, MA, USA, May 2005.
[5]
M. Caesar, T. Condie, J. Kannan, K. Lakshminarayanan, S. Shenker, and I. Stoica. Routing on Flat Labels. In Proc. of ACM SIGCOMM '06, pages 363--374, Pisa, Italy, Sept. 2006.
[6]
V. Cerf, S. Burleigh, A. Hooke, L. Torgerson, R. Durst, K. Scott, K. Fall, and H. Weiss. Delay Tolerant Networking Architecture. Internet Draft, IETF, Dec. 2006.
[7]
D. Clark and D. Tennenhouse. Architectural Consideration for a New Generation of Protocols. In Proc. of ACM SIGCOMM '90, pages 200--208, Philadelphia, USA, 1990.
[8]
D. D. Clark. Interoperation, Open Interfaces, and Protocol Architecture. The Unpredictable Certainty, Information Infrastructure Through 2000: White Papers, pages 133--144, 1997.
[9]
C. Ellison, B. Frantz, B. Lampson, R. Rivest, B. Thomas, and T. Ylönen. SPKI Certificate Theory. RFC 2693, IETF, Sept. 1999.
[10]
End-Middle-End Research Group. http://www.irtf.org/charter?gtype=rg&group=eme.
[11]
P. T. Eugster, P. A. Felber, R. Guerraoui, and A. -M. Kermarrec. The Many Faces of Publish/Subscribe. ACM Computing Surveys, 35(2):114--131, June 2003.
[12]
K. Fall. A Delay-Tolerant Network Architecture for Challenged Internets. In Proc. of ACM SIGCOMM '03, pages 27--34, Karlsruhe, Germany, 2003.
[13]
R. Fielding, J. Gettys, J. Mogul, H. Frystyk, L. Masinter, P. Leach, and T. Berners-Lee. Hypertext Transfer Protocol: HTTP/1.1. RFC 2616, IETF, June 1999.
[14]
B. Ford, J. Strauss, C. Lesniewski-Laas, S. Rhea, F. Kaashoek, and R. Morris. Persistent Personal Names for Globally Connected Mobile Devices. In Proc. of OSDI 2006, pages 233--248, Seattle, WA, USA, Nov. 2006.
[15]
P. Francis and R. Gummadi. IPNL: A NAT-extended Internet Architecture. In Proc. of ACM SIGCOMM '01, pages 69--80, San Diego, CA, USA, Aug. 2001.
[16]
M. J. Freedman, K. Lakshminarayanan, and D. Mazières. OASIS: Anycast for Any Service. In Proc. of NSDI '06, pages 129--142, San Jose, CA, USA, May 2006.
[17]
D. Funato, K. Yasuda, and H. Tokuda. TCP-R: TCP Mobility Support for Continuous Operation. In Proc. of ICNP '97, pages 229--236, Atlanta, GA, USA, 1997.
[18]
GEANT2. http://www.geant2.net.
[19]
M. Gritter and D. R. Cheriton. TRIAD: A New Next-Generation Internet Architecture. http://www-dsg.stanford.edu/triad/, July 2000.
[20]
S. Guha and P. Francis. An End-Middle-End Architecture for Secure Internet. In Proc. of ACM SIGCOMM '07, Kyoto, Japan, Aug. 2007.
[21]
A. Gulli and A. Signorini. The Indexable Web Is More Than 11.5 Billion Pages. In Special Interest Tracks and Posters of The 14th International Conference on World Wide Web, WWW '05, pages 902--903, Chiba, Japan, 2005.
[22]
M. Handley and A. Greenhalgh. Steps Towards a DoS-resistant Internet Architecture. In Proc. of ACM SIGCOMM FDNA '04, pages 49--56, Portland, OR, USA, Aug. 2004.
[23]
D. V. Krioukov, K. R. Fall, and X. Yang. Compact Routing on Internet-like Graphs. In Proc. of IEEE INFOCOM, Hong Kong, Mar. 2004.
[24]
J. Li, M. N. Krohn, D. Mazières, and D. Shasha. Secure Untrusted Data Repository (SUNDR). In Proc. of OSDI 2004, pages 121--136, San Francisco, CA, USA, Dec. 2004.
[25]
D. Mazières, M. Kaminsky, M. F. Kaashoek, and E. Witchel. Separating Key Management from File System Security. In Proc. of SOSP '99, pages 124--139, Charleston, SC, USA, Dec. 1999.
[26]
Measurement Factory. Public Benchmarking Results. http://www.measurement-factory.com/results, Dec. 2001.
[27]
D. Meyer, L. Zhang, and K. Fall. Report from the IAB Workshop on Routing and Addressing. Internet Draft, IETF, Dec. 2006.
[28]
R. Moskowitz and P. Nikander. Host Identity Protocol Architecture. RFC 4423, IETF, May 2006.
[29]
A. Nandi, A. Ganjam, P. Druschel, T. Eugene, I. Stoica, H. Zhang, and B. Bhattacharjee. SAAR: A Shared Control Plane for Overlay Multicast. In Proc. of NSDI '07, pages 57--72, Cambridge, MA, USA, Apr. 2007.
[30]
T. Okamoto and J. Stern. Almost Uniform Density of Power Residues and the Provable Security of ESIGN. In ASIACRYPT, volume 2894 of LNCS, pages 287--301, Dec. 2003.
[31]
J. Rosenberg, H. Schulzrinne, G. Camarillo, A. Johnston, J. Peterson, R. Sparks, and E. Schooler. SIP: Session Initiation Protocol. RFC 3261, IETF, June 2002.
[32]
M. A. C. Snoeren. A Session-based Architecture for Internet Mobility. PhD thesis, MIT, Department of Electrical Engineering and Computer Science, Feb. 2003.
[33]
R. Stewart, Q. Xie, K. Morneault, C. Sharp, H. Schwarzbauer, T. Taylor, I. Rytina, M. Kalla, L. Zhang, and V. Paxson. Stream Control Transmission Protocol. RFC 2960, IETF, Oct. 2000.
[34]
J. Su, J. Scott, P. Hui, E. Upton, M. H. Lim, C. Diot, J. Crowcroft, A. Goel, and E. de Lara. Haggle: Clean-slate Networking for Mobile Devices. Technical Report UCAM-CL-TR-680, University of Cambridge, Computer Laboratory, Jan. 2007.
[35]
Sun Microsystems. Project Blackbox. http://www.sun.com/blackbox/, Jan. 2007.
[36]
N. Tolia, M. Kaminsky, D. G. Andersen, and S. Patil. An Architecture for Internet Data Transfer. In Proc. of NSDI '06, pages 253--266, San Jose, CA, USA, May 2006.
[37]
M. Walfish, H. Balakrishnan, and S. Shenker. Untangling the Web from DNS. In Proc. of NSDI '04, pages 225--238, San Francisco, CA, USA, Mar. 2004.
[38]
M. Walfish, J. Stribling, M. Krohn, H. Balakrishnan, R. Morris, and S. Shenker. Middleboxes No Longer Considered Harmful. In Proc. of OSDI 2004, pages 215--230, San Francisco, CA, USA, Dec. 2004.
[39]
M. Walfish, J. D. Zamfirescu, H. Balakrishnan, D. Karger, and S. Shenker. Distributed Quota Enforcement for Spam Control. In Proc. of NSDI '06, pages 281--296, San Jose, CA, USA, May 2006.
[40]
D. Wendlandt, I. Avramopoulos, D. G. Andersen, and J. Rexford. Don't Secure Routing Protocols, Secure Data Delivery. In Proc. of Hot Topics in Networks, Irvine, CA, USA, Nov. 2006.
[41]
A. Yaar, A. Perrig, and D. Song. SIFF: A Stateless Internet Flow Filter to Mitigate DDoS Flooding Attacks. In Proc. of IEEE Symposium on Security and Privacy, pages 130--143, Oakland, CA, USA, 2004.
[42]
X. Yang, D. Clark, and A. Berger. NIRA: A New Inter-Domain Routing Architecture. IEEE/ACM Transactions on Networking (to appear), Dec. 2007.
[43]
X. Yang, D. Wetherall, and T. Anderson. A DoS-limiting Network Architecture. In Proc. of ACM SIGCOMM '05, pages 241--252, 2005.

Cited By

View all

Index Terms

  1. A data-oriented (and beyond) network architecture

        Recommendations

        Comments

        Information & Contributors

        Information

        Published In

        cover image ACM Conferences
        SIGCOMM '07: Proceedings of the 2007 conference on Applications, technologies, architectures, and protocols for computer communications
        August 2007
        432 pages
        ISBN:9781595937131
        DOI:10.1145/1282380
        • cover image ACM SIGCOMM Computer Communication Review
          ACM SIGCOMM Computer Communication Review  Volume 37, Issue 4
          October 2007
          420 pages
          ISSN:0146-4833
          DOI:10.1145/1282427
          Issue’s Table of Contents
        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Sponsors

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 27 August 2007

        Permissions

        Request permissions for this article.

        Check for updates

        Author Tags

        1. data
        2. internet architecture
        3. middleboxes
        4. name resolution
        5. naming

        Qualifiers

        • Article

        Conference

        SIGCOMM07
        Sponsor:
        SIGCOMM07: ACM SIGCOMM 2007 Conference
        August 27 - 31, 2007
        Kyoto, Japan

        Acceptance Rates

        Overall Acceptance Rate 462 of 3,389 submissions, 14%

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)363
        • Downloads (Last 6 weeks)50
        Reflects downloads up to 06 Jan 2025

        Other Metrics

        Citations

        Cited By

        View all

        View Options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        Login options

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media