Naming in Content-Oriented Architectures
Title | Naming in Content-Oriented Architectures |
Publication Type | Conference Paper |
Year of Publication | 2011 |
Authors | Ghodsi, A., Koponen T., Rajahalme J., Sarolahti P., & Shenker S. J. |
Page(s) | 1-6 |
Other Numbers | 3387 |
Abstract | There have been several recent proposals for content-oriented networkarchitectures whose underlying mechanisms are surprisinglysimilar in spirit, but which differ in many details. In this paperwe step back from the mechanistic details and focus only on thearea where the these approaches have a fundamental difference:naming. In particular, some designs adopt a hierarchical, human readablenames, whereas others use self-certifying names. Whendiscussing a network architecture, three of the most importantrequirements are security, scalability, and flexibility. In this paperwe examine the two different naming approaches in terms of thesethree basic goals. |
Acknowledgment | This work was supported by TEKES as part of the Future Internet program of TIVIT (Finnish Strategic Centre for Science, Technology and Innovation in the field of ICT). |
URL | http://www.icsi.berkeley.edu/pubs/networking/ICSI_namingincontentoriented11.pdf |
Bibliographic Notes | Proceedings of the ACM SIGCOMM Workshop on Information-Centric Networking (ICN 2011), pp. 1-6, Toronto, ON, Canada |
Abbreviated Authors | A. Ghodsi, T. Koponen, J. Rajahalme, P. Sarolahti, and S. Shenker |
ICSI Research Group | Networking and Security |
ICSI Publication Type | Article in conference proceedings |