1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388 389 390 391 392 393 394 395 396 397 398 399 400 401 402 403 404 405 406 407 408 409 410 411 412 413 414 415 416 417 418 419 420 421 422 423 424 425 426 427 428 429 430 431 432 433 434 435 436 437 438 439 440 441 442 443 444 445 446 447 448 449 450 451 452 453 454 455 456 457 458 459 460 461 462 463 464 465 466 467 468 469 470 471 472 473 474 475 476 477 478 479 480 481 482 483 484 485 486 487 488 489 490 491 492 493 494 495 496 497 498 499 500 501 502 503 504 505 506 507 508 509 510 511 512 513 514 515 516 517 518 519 520 521 522 523 524 525 526 527 528 529 530 531 532 533 534 535 536 537 538 539 540 541 542 543 544 545 546 547 548 549 550 551 552 553 554 555 556 557 558 559 560 561 562 563 564 565 566 567 568 569 570 571 572 573 574 575 576 577 578 579 580 581 582 583 584 585 586 587 588 589 590 591 592 593 594 595 596 597 598 599 600 601 602 603 604 605 606 607 608 609 610 611 612 613 614 615 616 617 618 619 620 621 622 623 624 625 626 627 628 629 630 631 632 633 634 635 636 637 638 639 640 641 642 643 644 645 646 647 648 649 650 651 652 653 654 655 656 657 658 659 660 661 662 663 664 665 666 667 668 669 670 671 672 673 674 675 676 677 678 679 680 681 682 683 684 685 686 687 688 689 690 691 692 693 694 695 696 697 698 699 700 701 702 703 704 705 706 707 708 709 710 711 712 713 714 715 716 717 718 719 720 721 722 723 724 725 726 727 728 729 730 731 732 733 734 735 736 737 738 739 740 741 742 743 744 745 746 747 748 749 750 751 752 753 754 755 756 757 758 759 760 761 762 763 764 765 766 767 768 769 770 771 772 773 774 775 776 777 778 779 780 781 782 783 784 785 786 787 788 789 790 791 792 793 794 795 796 797 798 799 800 801 802 803 804 805 806 807 808 809 810 811 812 813 814 815 816 817 818 819 820 821 822 823 824 825 826 827 828 829 830 831 832 833 834 835 836 837 838 839 840 841 842 843 844 845 846 847 848 849 850 851 852 853 854 855 856 857 858 859 860 861 862 863 864 865 866 867 868 869 870 871 872 873 874 875 876 877 878 879 880 881 882 883 884 885 886 887 888 889 890 891 892 893 894 895 896 897 898 899 900 901 902 903 904 905 906 907 908 909 910 911 912 913 914 915 916 917 918 919 920 921 922 923 924 925 926 927 928 929 930 931 932 933 934 935 936 937 938 939 940 941 942 943 944 945 946 947 948 949 950 951 952 953 954 955 956 957 958 959 960 961 962 963 964 965 966 967 968 969 970 971 972 973 974 975 976 977 978 979 980 981 982 983 984 985 986 987 988 989 990 991 992 993 994 995 996 997 998 999 1000 1001 1002 1003 1004 1005 1006 1007 1008 1009 1010 1011 1012 1013 1014 1015 1016 1017 1018 1019 1020 1021 1022 1023 1024 1025 1026 1027 1028 1029 1030 1031 1032 1033 1034 1035 1036 1037 1038 1039 1040 1041 1042 1043 1044 1045 1046 1047 1048 1049 1050 1051 1052 1053 1054 1055 1056 1057 1058 1059 1060 1061 1062 1063 1064 1065 1066 1067 1068 1069 1070 1071 1072 1073 1074 1075 1076 1077 1078 1079 1080 1081 1082 1083 1084 1085 1086 1087 1088 1089 1090 1091 1092 1093 1094 1095 1096 1097 1098 1099 1100 1101 1102 1103 1104 1105 1106 1107 1108 1109 1110 1111 1112 1113 1114 1115 1116 1117 1118 1119 1120 1121 1122 1123 1124 1125 1126 1127 1128 1129 1130 1131 1132 1133 1134 1135 1136 1137 1138 1139 1140 1141 1142 1143 1144 1145 1146 1147 1148 1149 1150 1151 1152 1153 1154 1155 1156 1157 1158 1159 1160 1161 1162 1163 1164 1165 1166 1167 1168 1169 1170 1171 1172 1173 1174 1175 1176 1177 1178 1179 1180 1181 1182 1183 1184 1185 1186 1187 1188 1189 1190 1191 1192 1193 1194 1195 1196 1197 1198 1199 1200 1201 1202 1203 1204 1205 1206 1207 1208 1209 1210 1211 1212 1213 1214 1215 1216 1217 1218 1219 1220 1221 1222 1223 1224 1225 1226 1227 1228 1229 1230 1231 1232 1233 1234 1235 1236 1237 1238 1239 1240 1241 1242 1243 1244 1245 1246 1247 1248 1249 1250 1251 1252 1253 1254 1255 1256 1257 1258 1259 1260 1261 1262 1263 1264 1265 1266 1267 1268 1269 1270 1271 1272 1273 1274 1275 1276 1277 1278 1279 1280 1281 1282 1283 1284 1285 1286 1287 1288 1289 1290 1291 1292 1293 1294 1295 1296 1297 1298 1299 1300 1301 1302 1303 1304 1305 1306 1307 1308 1309 1310 1311 1312 1313 1314 1315 1316 1317 1318 1319 1320 1321 1322 1323 1324 1325 1326 1327 1328 1329 1330 1331 1332 1333 1334 1335 1336 1337 1338 1339 1340 1341 1342 1343 1344 1345 1346 1347 1348 1349 1350 1351 1352 1353 1354 1355 1356 1357 1358 1359 1360 1361 1362 1363 1364 1365 1366 1367 1368 1369 1370 1371 1372 1373 1374 1375 1376 1377 1378 1379 1380 1381 1382 1383 1384 1385 1386 1387 1388 1389 1390 1391 1392 1393 1394 1395 1396 1397 1398 1399 1400 1401 1402 1403 1404 1405 1406 1407 1408 1409 1410 1411 1412 1413 1414 1415 1416 1417 1418 1419 1420 1421 1422 1423 1424 1425 1426 1427 1428 1429 1430 1431 1432 1433 1434 1435 1436 1437 1438 1439 1440 1441 1442 1443 1444 1445 1446 1447 1448 1449 1450 1451 1452 1453 1454 1455 1456 1457 1458 1459 1460 1461 1462 1463 1464 1465 1466 1467 1468 1469 1470 1471 1472 1473 1474 1475 1476 1477 1478 1479 1480 1481 1482 1483 1484 1485 1486 1487 1488 1489 1490 1491 1492 1493 1494 1495 1496 1497 1498 1499 1500 1501 1502 1503 1504 1505 1506 1507 1508 1509 1510 1511 1512 1513 1514 1515 1516 1517 1518 1519 1520 1521 1522 1523 1524 1525 1526 1527 1528 1529 1530 1531 1532 1533 1534 1535 1536 1537 1538 1539 1540 1541 1542 1543 1544 1545 1546 1547 1548 1549 1550 1551 1552 1553 1554 1555 1556 1557 1558 1559 1560 1561 1562 1563 1564 1565 1566 1567 1568 1569 1570 1571 1572 1573 1574 1575 1576 1577 1578 1579 1580 1581 1582 1583 1584 1585 1586 1587 1588 1589 1590 1591 1592 1593 1594 1595 1596 1597 1598 1599 1600 1601 1602 1603 1604 1605 1606 1607 1608 1609 1610 1611 1612 1613 1614 1615 1616 1617 1618 1619 1620 1621 1622 1623 1624 1625 1626 1627 1628 1629 1630 1631 1632 1633 1634 1635 1636 1637 1638 1639 1640 1641 1642 1643 1644 1645 1646 1647 1648 1649 1650 1651 1652 1653 1654 1655 1656 1657 1658 1659 1660 1661 1662 1663 1664 1665 1666 1667 1668 1669 1670 1671 1672 1673 1674 1675 1676 1677 1678 1679 1680 1681 1682 1683 1684 1685 1686 1687 1688 1689 1690 1691 1692 1693 1694 1695 1696 1697 1698 1699 1700 1701 1702 1703 1704 1705 1706 1707 1708 1709 1710 1711 1712 1713 1714 1715 1716 1717 1718 1719 1720 1721 1722 1723 1724 1725 1726 1727 1728 1729 1730 1731 1732 1733 1734 1735 1736 1737 1738 1739 1740 1741 1742 1743 1744 1745 1746 1747 1748 1749 1750 1751 1752 1753 1754 1755 1756 1757 1758 1759 1760 1761 1762 1763 1764 1765 1766 1767 1768 1769 1770 1771 1772 1773 1774 1775 1776 1777 1778 1779 1780 1781 1782 1783 1784 1785 1786 1787 1788 1789 1790 1791 1792 1793 1794 1795 1796 1797 1798 1799 1800 1801 1802 1803 1804 1805 1806 1807 1808 1809 1810 1811 1812 1813 1814 1815 1816 1817 1818 1819 1820 1821 1822 1823 1824 1825 1826 1827 1828 1829 1830 1831 1832 1833 1834 1835 1836 1837 1838 1839 1840 1841 1842 1843 1844 1845 1846 1847 1848 1849 1850 1851 1852 1853 1854 1855 1856 1857 1858 1859 1860 1861 1862 1863 1864 1865 1866 1867 1868 1869 1870 1871 1872 1873 1874 1875 1876 1877 1878 1879 1880 1881 1882 1883 1884 1885 1886 1887 1888 1889 1890 1891 1892 1893 1894 1895 1896 1897 1898 1899 1900 1901 1902 1903 1904 1905 1906 1907 1908 1909 1910 1911 1912 1913 1914 1915 1916 1917 1918 1919 1920 1921 1922 1923 1924 1925 1926 1927 1928 1929 1930 1931 1932 1933 1934 1935 1936 1937 1938 1939 1940 1941 1942 1943 1944 1945 1946 1947 1948 1949 1950 1951 1952 1953 1954 1955 1956 1957 1958 1959 1960 1961 1962 1963 1964 1965 1966 1967 1968 1969 1970 1971 1972 1973 1974 1975 1976 1977 1978 1979 1980 1981 1982 1983 1984 1985 1986 1987 1988 1989 1990 1991 1992 1993 1994 1995 1996 1997 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 2015 2016 2017 2018 2019 2020 2021 2022 2023 2024 2025 2026 2027 2028 2029 2030 2031 2032 2033 2034 2035 2036 2037 2038 2039 2040 2041 2042 2043 2044 2045 2046 2047 2048 2049 2050 2051 2052 2053 2054 2055 2056 2057 2058 2059 2060 2061 2062 2063 2064 2065 2066 2067 2068 2069 2070 2071 2072 2073 2074 2075 2076 2077 2078 2079 2080 2081 2082 2083 2084 2085 2086 2087 2088 2089 2090 2091 2092 2093 2094 2095 2096 2097 2098 2099 2100 2101 2102 2103 2104 2105 2106 2107 2108 2109 2110 2111 2112 2113 2114 2115 2116 2117 2118 2119 2120 2121 2122 2123 2124 2125
|
<pre>Internet Research Task Force (IRTF) K. Pentikousis, Ed.
Request for Comments: 7945 Travelping
Category: Informational B. Ohlman
ISSN: 2070-1721 Ericsson
E. Davies
Trinity College Dublin
S. Spirou
Intracom Telecom
G. Boggia
Politecnico di Bari
September 2016
<span class="h1">Information-Centric Networking: Evaluation and Security Considerations</span>
Abstract
This document presents a number of considerations regarding
evaluating Information-Centric Networking (ICN) and sheds some light
on the impact of ICN on network security. It also surveys the
evaluation tools currently available to researchers in the ICN area
and provides suggestions regarding methodology and metrics.
Status of This Memo
This document is not an Internet Standards Track specification; it is
published for informational purposes.
This document is a product of the Internet Research Task Force
(IRTF). The IRTF publishes the results of Internet-related research
and development activities. These results might not be suitable for
deployment. This RFC represents the consensus of the <insert_name>
Research Group of the Internet Research Task Force (IRTF). Documents
approved for publication by the IRSG are not a candidate for any
level of Internet Standard; see <a href="./rfc7841#section-2">Section 2 of RFC 7841</a>.
Information about the current status of this document, any errata,
and how to provide feedback on it may be obtained at
<a href="http://www.rfc-editor.org/info/rfc7945">http://www.rfc-editor.org/info/rfc7945</a>.
<span class="grey">Pentikousis, et al. Informational [Page 1]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-2" ></span>
<span class="grey"><a href="./rfc7945">RFC 7945</a> ICN Evaluation and Security September 2016</span>
Copyright Notice
Copyright (c) 2016 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to <a href="https://www.rfc-editor.org/bcp/bcp78">BCP 78</a> and the IETF Trust's Legal
Provisions Relating to IETF Documents
(<a href="http://trustee.ietf.org/license-info">http://trustee.ietf.org/license-info</a>) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document.
Table of Contents
<a href="#section-1">1</a>. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . <a href="#page-3">3</a>
<a href="#section-2">2</a>. Evaluation Considerations . . . . . . . . . . . . . . . . . . <a href="#page-4">4</a>
<a href="#section-2.1">2.1</a>. Topology Selection . . . . . . . . . . . . . . . . . . . . <a href="#page-5">5</a>
<a href="#section-2.2">2.2</a>. Traffic Load . . . . . . . . . . . . . . . . . . . . . . . <a href="#page-6">6</a>
<a href="#section-2.3">2.3</a>. Choosing Relevant Metrics . . . . . . . . . . . . . . . . <a href="#page-10">10</a>
<a href="#section-2.3.1">2.3.1</a>. Traffic Metrics . . . . . . . . . . . . . . . . . . . <a href="#page-13">13</a>
<a href="#section-2.3.2">2.3.2</a>. System Metrics . . . . . . . . . . . . . . . . . . . . <a href="#page-14">14</a>
<a href="#section-2.4">2.4</a>. Resource Equivalence and Trade-Offs . . . . . . . . . . . <a href="#page-16">16</a>
<a href="#section-3">3</a>. ICN Security Aspects . . . . . . . . . . . . . . . . . . . . . <a href="#page-16">16</a>
<a href="#section-3.1">3.1</a>. Authentication . . . . . . . . . . . . . . . . . . . . . . <a href="#page-17">17</a>
<a href="#section-3.2">3.2</a>. Authorization, Access Control, and Logging . . . . . . . . <a href="#page-18">18</a>
<a href="#section-3.3">3.3</a>. Privacy . . . . . . . . . . . . . . . . . . . . . . . . . . <a href="#page-19">19</a>
<a href="#section-3.4">3.4</a>. Changes to the Network Security Threat Model . . . . . . . <a href="#page-20">20</a>
<a href="#section-4">4</a>. Evaluation Tools . . . . . . . . . . . . . . . . . . . . . . . <a href="#page-21">21</a>
<a href="#section-4.1">4.1</a>. Open-Source Implementations . . . . . . . . . . . . . . . <a href="#page-21">21</a>
<a href="#section-4.2">4.2</a>. Simulators and Emulators . . . . . . . . . . . . . . . . . <a href="#page-22">22</a>
<a href="#section-4.2.1">4.2.1</a>. ndnSIM . . . . . . . . . . . . . . . . . . . . . . . . <a href="#page-22">22</a>
<a href="#section-4.2.2">4.2.2</a>. ccnSIM . . . . . . . . . . . . . . . . . . . . . . . . <a href="#page-23">23</a>
<a href="#section-4.2.3">4.2.3</a>. Icarus Simulator . . . . . . . . . . . . . . . . . . . <a href="#page-23">23</a>
<a href="#section-4.3">4.3</a>. Experimental Facilities . . . . . . . . . . . . . . . . . <a href="#page-24">24</a>
<a href="#section-4.3.1">4.3.1</a>. Open Network Lab (ONL) . . . . . . . . . . . . . . . . <a href="#page-24">24</a>
<a href="#section-4.3.2">4.3.2</a>. POINT Testbed . . . . . . . . . . . . . . . . . . . . <a href="#page-25">25</a>
<a href="#section-4.3.3">4.3.3</a>. CUTEi: Container-Based ICN Testbed . . . . . . . . . . <a href="#page-25">25</a>
<a href="#section-5">5</a>. Security Considerations . . . . . . . . . . . . . . . . . . . <a href="#page-25">25</a>
<a href="#section-6">6</a>. Informative References . . . . . . . . . . . . . . . . . . . . <a href="#page-26">26</a>
Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . . . <a href="#page-37">37</a>
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . <a href="#page-38">38</a>
<span class="grey">Pentikousis, et al. Informational [Page 2]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-3" ></span>
<span class="grey"><a href="./rfc7945">RFC 7945</a> ICN Evaluation and Security September 2016</span>
<span class="h2"><a class="selflink" id="section-1" href="#section-1">1</a>. Introduction</span>
Information-Centric Networking (ICN) is a networking concept that
arose from the desire to align the operation model of a network with
the model of its typical use. For TCP/IP networks, this implies
changing the mechanisms of data access and transport from a host-to-
host model to a user-to-information model. The premise is that the
effort invested in changing models will be offset, or even surpassed,
by the potential of a "better" network. However, such a claim can be
validated only if it is quantified.
Different ICN approaches are evaluated in the peer-reviewed
literature using a mixture of theoretical analysis, simulation and
emulation techniques, and empirical (testbed) measurements. The
specific methodology employed may depend on the experimentation goal,
e.g., whether one wants to evaluate scalability, quantify resource
utilization, or analyze economic incentives. In addition, though, we
observe that ease and convenience of setting up and running
experiments can sometimes be a factor in published evaluations. As
discussed in [<a href="./rfc7476" title=""Information-Centric Networking: Baseline Scenarios"">RFC7476</a>], the development phase that ICN is going
through and the plethora of approaches to tackle the hardest problems
make this a very active and growing research area but, on the
downside, it also makes it more difficult to compare different
proposals on an equal footing.
Performance evaluation using actual network deployments has the
advantage of realistic workloads and reflects the environment where
the service or protocol is to be deployed. In the case of ICN,
however, it is not currently clear what qualifies as a "realistic
workload". Trace-based analysis of ICN is in its infancy, and more
work is needed towards defining characteristic workloads for ICN
evaluation studies. Accordingly, the experimental process and the
evaluation methodology per se are actively being researched for
different ICN architectures. Numerous factors affect the
experimental results, including the topology selected; the background
traffic that an application is being subjected to; network conditions
such as available link capacities, link delays, and loss-rate
characteristics throughout the selected topology; failure and
disruption patterns; node mobility; and the diversity of devices
used.
The goal of this document is to summarize evaluation guidelines and
tools alongside suggested data sets and high-level approaches. We
expect this to be of interest to the ICN community as a whole, as it
can assist researchers and practitioners alike to compare and
contrast different ICN designs, as well as with the state of the art
in host-centric solutions, and identify the respective strengths and
weaknesses. We note that, apart from the technical evaluation of the
<span class="grey">Pentikousis, et al. Informational [Page 3]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-4" ></span>
<span class="grey"><a href="./rfc7945">RFC 7945</a> ICN Evaluation and Security September 2016</span>
functionality of an ICN architecture, the future success of ICN will
be largely driven by its deployability and economic viability.
Therefore, ICN evaluations should assess incremental deployability in
the existing network environment together with a view of how the
technical functions will incentivize deployers to invest in the
capabilities that allow the architecture to spread across the
network.
This document has been produced by the IRTF Information-Centric
Networking Research Group (ICNRG). The main objective of the ICNRG
is to couple ongoing ICN research in the above areas with solutions
that are relevant for evolving the Internet at large. The ICNRG
produces documents that provide guidelines for experimental
activities in the area of ICN so that different, alternative
solutions can be compared consistently, and information sharing can
be accomplished for experimental deployments. This document
incorporates input from ICNRG participants and their corresponding
text contributions; it has been reviewed by several ICNRG active
participants (see the Acknowledgments), and represents the consensus
of the research group. That said, note that this document does not
constitute an IETF standard; see also [<a href="./rfc5743" title=""Definition of an Internet Research Task Force (IRTF) Document Stream"">RFC5743</a>].
The remainder of this document is organized as follows. <a href="#section-2">Section 2</a>
presents various techniques and considerations for evaluating
different ICN architectures. <a href="#section-3">Section 3</a> discusses the impact of ICN
on network security. <a href="#section-4">Section 4</a> surveys the tools currently available
to ICN researchers.
<span class="h2"><a class="selflink" id="section-2" href="#section-2">2</a>. Evaluation Considerations</span>
It is clear that the way we evaluate IP networks will not be directly
applicable to evaluating ICN. In IP, the focus is on the performance
and characteristics of end-to-end connections between a source and a
destination. In ICN, the "source" responding to a request can be any
ICN node in the network and may change from request to request. This
makes it difficult to use concepts like delay and throughput in a
traditional way. In addition, evaluating resource usage in ICN is a
more complicated task, as memory used for caching affects delays and
use of transmission resources; see the discussion on resource
equivalents in <a href="#section-2.4">Section 2.4</a>.
There are two major types of evaluations of ICN that we see a need to
make. One type is to compare ICN to traditional networking, and the
other type is to compare different ICN implementations and approaches
against each other.
In this section, we detail some of the functional components needed
when evaluating different ICN implementations and approaches.
<span class="grey">Pentikousis, et al. Informational [Page 4]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-5" ></span>
<span class="grey"><a href="./rfc7945">RFC 7945</a> ICN Evaluation and Security September 2016</span>
<span class="h3"><a class="selflink" id="section-2.1" href="#section-2.1">2.1</a>. Topology Selection</span>
There's a wealth of earlier work on topology selection for simulation
and performance evaluation of host-centric networks. While the
classic dumbbell topology is regarded as inappropriate for ICN, most
ICN studies so far have been based on that earlier work for host-
centric networks [<a href="./rfc7476" title=""Information-Centric Networking: Baseline Scenarios"">RFC7476</a>]. However, there is no single topology
that can be used to easily evaluate all aspects of ICN. Therefore,
one should choose from a range of topologies depending on the focus
of the evaluation.
For scalability and resilience studies, there is a wide range of
synthetic topologies, such as the Barabasi-Albert model [<a href="#ref-Barabasi99">Barabasi99</a>]
and the Watts-Strogatz small-world topology [<a href="#ref-Watts98" title=""Collective dynamics of 'small-world' networks"">Watts98</a>]. These allow
experiments to be performed whilst controlling various key parameters
(e.g., node degree). These synthetic topologies are appropriate in
the general case, as there are no practical assurances that a future
information-centric network will have the same topology as any of
today's networks.
When studies look at cost (e.g., transit cost) or migration to ICN,
realistic topologies should be used. These can be inferred from
Internet traces, such as the CAIDA Macroscopic Internet Topology Data
Kit (<a href="http://www.caida.org/data/active/internet-topology-data-kit">http://www.caida.org/data/active/internet-topology-data-kit</a>) and
Rocketfuel
(<a href="http://www.cs.washington.edu/research/networking/rocketfuel">http://www.cs.washington.edu/research/networking/rocketfuel</a>). A
problem is the large size of the topology (approximately 45K
Autonomous Systems, close to 200K links), which may limit the
scalability of the employed evaluation tool. Katsaros et al.
[<a href="#ref-Katsaros15">Katsaros15</a>] address this problem by using scaled down topologies
created following the methodology described in [<a href="#ref-Dimitropoulos09">Dimitropoulos09</a>].
Studies that focus on node or content mobility can benefit from
topologies and their dynamic aspects as used in the Delay-Tolerant
Networking (DTN) community. As mentioned in [<a href="./rfc7476" title=""Information-Centric Networking: Baseline Scenarios"">RFC7476</a>], DTN traces
are available to be used in such ICN evaluations.
As with host-centric topologies, defining just a node graph will not
be enough for most ICN studies. The experimenter should also clearly
define and list the respective matrices that correspond to the
network, storage, and computation capacities available at each node
as well as the delay characteristics of each link [<a href="#ref-Montage" title=""Montage Topology Manager: Tools for Constructing and Sharing Representative Internet Topologies"">Montage</a>]. Real
values for such parameters can be taken from existing platforms such
as iPlane (<a href="http://iplane.cs.washington.edu">http://iplane.cs.washington.edu</a>). Synthetic values could
be produced with specific tools [<a href="#ref-Kaune09" title=""Modelling the Internet Delay Space Based on Geographical Locations"">Kaune09</a>].
<span class="grey">Pentikousis, et al. Informational [Page 5]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-6" ></span>
<span class="grey"><a href="./rfc7945">RFC 7945</a> ICN Evaluation and Security September 2016</span>
<span class="h3"><a class="selflink" id="section-2.2" href="#section-2.2">2.2</a>. Traffic Load</span>
In this subsection, we provide a set of common guidelines, in the
form of what we will refer to as a content catalog for different
scenarios. This catalog, which is based on previously published
work, can be used to evaluate different ICN proposals, for instance,
on routing, congestion control, and performance, and can be
considered as other kinds of ICN contributions emerge. As we are
still lacking ICN-specific traffic workloads, we can currently only
extrapolate from today's workloads. A significant challenge then
relates to the identification of the applications contributing to the
observed traffic (e.g., Web or peer-to-peer), as well as to the exact
amount of traffic they contribute to the overall traffic mixture.
Efforts in this direction can take heed of today's traffic mix
comprising Web, peer-to-peer file sharing, and User-Generated Content
(UGC) platforms (e.g., YouTube), as well as Video on Demand (VoD)
services. Publicly available traces for these include those from web
sites such as the MultiProbe Framework
<<a href="http://multiprobe.ewi.tudelft.nl/multiprobe.html">http://multiprobe.ewi.tudelft.nl/multiprobe.html</a>>,
<<a href="http://an.kaist.ac.kr/traces/IMC2007.html">http://an.kaist.ac.kr/traces/IMC2007.html</a>> (see also [<a href="#ref-Cha07" title=""I tube, you tube, everybody tubes: analyzing the world's largest user generated content video system"">Cha07</a>]), and
the UMass Trace Repository
<<a href="http://traces.cs.umass.edu/index.php/Network/Network">http://traces.cs.umass.edu/index.php/Network/Network</a>>.
Taking a more systematic approach, and with the purpose of modeling
the traffic load, we can resort to measurement studies that
investigate the composition of Internet traffic, such as [<a href="#ref-Labovitz10">Labovitz10</a>]
and [<a href="#ref-Maier09" title=""On dominant characteristics of residential broadband internet traffic"">Maier09</a>]. In [<a href="#ref-Labovitz10">Labovitz10</a>], a large-scale measurement study was
performed, with the purpose of studying the traffic crossing inter-
domain links. The results indicate the dominance of Web traffic,
amounting to 52% over all measured traffic. However, Deep Packet
Inspection (DPI) techniques reveal that 25-40% of all HTTP traffic
actually carries video traffic. Results from DPI techniques also
reveal the difficulty in correctly identifying the application type
in the case of P2P traffic: mapping observed port numbers to well-
known applications shows P2P traffic constituting only 0.85% of
overall traffic, while DPI raises this percentage to 18.32%
[<a href="#ref-Labovitz10">Labovitz10</a>]. Relevant studies on a large ISP show that the
percentage of P2P traffic ranges from 17% to 19% of overall traffic
[<a href="#ref-Maier09" title=""On dominant characteristics of residential broadband internet traffic"">Maier09</a>]. Table 1 provides an overview of these figures. The
"other" traffic type denotes traffic that cannot be classified in any
of the first three application categories, and it consists of
unclassified traffic and traffic heavily fragmented into several
applications (e.g., 0.17% DNS traffic).
<span class="grey">Pentikousis, et al. Informational [Page 6]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-7" ></span>
<span class="grey"><a href="./rfc7945">RFC 7945</a> ICN Evaluation and Security September 2016</span>
Traffic Type | Ratio
=====================
Web | 31-39%
---------------------
P2P | 17-19%
---------------------
Video | 13-21%
---------------------
Other | 29-31%
=====================
Table 1: Traffic Type Ratios of Total Traffic [<a href="#ref-Labovitz10">Labovitz10</a>] [<a href="#ref-Maier09" title=""On dominant characteristics of residential broadband internet traffic"">Maier09</a>]
The content catalog for each type of traffic can be characterized by
a specific set of parameters:
a) the cardinality of the estimated content catalog
b) the size of the exchanged contents (either chunks or entire named
information objects)
c) the popularity of objects (expressed in their request frequency)
In most application types, the popularity distribution follows some
power law, indicating that a small number of information items
trigger a large proportion of the entire set of requests. The exact
shape of the power law popularity distribution directly impacts the
performance of the underlying protocols. For instance, highly skewed
popularity distributions (e.g., a Zipf-like distribution with a high
slope value) favor the deployment of caching schemes, since caching a
very small set of information items can dramatically increase the
cache hit ratio.
Several studies in the past few years have stated that Zipf's law is
the discrete distribution that best represents the request frequency
in a number of application scenarios, ranging from the Web to VoD
services. The key aspect of this distribution is that the frequency
of a content request is inversely proportional to the rank of the
content itself, i.e., the smaller the rank, the higher the request
frequency. If M denotes the content catalog cardinality and 1 <= i
<= M denotes the rank of the i-th most popular content, we can
express the probability of requesting the content with rank "i" as:
P(X=i) = (1 / i^(alpha)) / C, with C = SUM(1 / j^(alpha)), alpha > 0
where the sum is obtained considering all values of j, 1 <= j <= M.
<span class="grey">Pentikousis, et al. Informational [Page 7]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-8" ></span>
<span class="grey"><a href="./rfc7945">RFC 7945</a> ICN Evaluation and Security September 2016</span>
A recent analysis of HTTP traffic showed that content popularity is
better reflected by a trimodal distribution model in which the head
and tail of a Zipf distribution (with slope value 0.84) are replaced
by two discrete Weibull distributions with shape parameter values 0.5
and 0.24, respectively [<a href="#ref-IMB2014" title=""Analyzing Cacheable Traffic in ISP Access Networks for Micro CDN Applications via Content-Centric Networking"">IMB2014</a>].
A variation of the Zipf distribution, termed the Mandelbrot-Zipf
distribution was suggested [<a href="#ref-Saleh06" title=""Modeling and caching of peer- to-peer traffic"">Saleh06</a>] to better model environments
where nodes can locally store previously requested content. For
example, it was observed that peer-to-peer file-sharing applications
typically exhibited a 'fetch-at-most-once' style of behavior. This
is because peers tend to persistently store the files they download,
a behavior that may also be prevalent in ICN.
Popularity can also be characterized in terms of:
a) The temporal dynamics of popularity, i.e., how requests are
distributed in time. The popularity distribution expresses the
number of requests submitted for each information item
participating into a certain workload. However, they do not
describe how these requests are distributed in time. This aspect
is of primary importance when considering the performance of
caching schemes since the ordering of the requests obviously
affects the contents of a cache. For example, with a Least
Frequently Used (LFU) cache replacement policy, if all requests
for a certain item are submitted close in time, the item is
unlikely to be evicted from the cache, even by a (globally) more
popular item whose requests are more evenly distributed in time.
The temporal ordering of requests gains even more importance when
considering workloads consisting of various applications, all
competing for the same cache space.
b) The spatial locality of popularity i.e., how requests are
distributed throughout a network. The importance of spatial
locality relates to the ability to avoid redundant traffic in the
network. If requests are highly localized in some area of the
entire network, then similar requests can be more efficiently
served with mechanisms such as caching and/or multicast, i.e., the
concentration of similar requests in a limited area of the network
allows increasing the perceived cache hit ratios at caches in the
area and/or the traffic savings from the use of multicast.
Table 2 provides an overview of distributions that can be used to
model each of the identified traffic types i.e., Web, Video (based
on YouTube measurements), and P2P (based on BitTorrent
measurements). These distributions are the outcome of a series of
modeling efforts based on measurements of real traffic workloads
([<a href="#ref-Breslau99">Breslau99</a>] [<a href="#ref-Mahanti00">Mahanti00</a>] [<a href="#ref-Busari02" title=""ProWGen: a synthetic workload generation tool for simulation evaluation of web proxy caches"">Busari02</a>] [<a href="#ref-Arlitt97" title=""Internet web servers: workload characterization and performance implications"">Arlitt97</a>] [<a href="#ref-Barford98">Barford98</a>]
[<a href="#ref-Barford99">Barford99</a>] [<a href="#ref-Hefeeda08">Hefeeda08</a>] [<a href="#ref-Guo07" title=""A performance study of BitTorrent-like peer-to- peer systems"">Guo07</a>] [<a href="#ref-Bellissimo04">Bellissimo04</a>] [<a href="#ref-Cheng08" title=""Statistics and social network of YouTube videos"">Cheng08</a>]
<span class="grey">Pentikousis, et al. Informational [Page 8]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-9" ></span>
<span class="grey"><a href="./rfc7945">RFC 7945</a> ICN Evaluation and Security September 2016</span>
[<a href="#ref-Cheng13" title=""Understanding the Characteristics of Internet Short Video Sharing: YouTube as a Case Study"">Cheng13</a>]). A tool for the creation of synthetic workloads
following these models, and also allowing the generation of
different traffic mixes, is described in [<a href="#ref-Katsaros12">Katsaros12</a>].
| Object Size | Temporal Locality | Popularity Distribution
=====================================================================
Web | Concatenation | Ordering via the | Zipf: p(i)=K/i^a
| of Lognormal | Least Recently Used | i: popularity rank
| (body) and | (LRU) stack model | N: total items
| Pareto (tail) | [<a href="#ref-Busari02" title=""ProWGen: a synthetic workload generation tool for simulation evaluation of web proxy caches"">Busari02</a>] | K: 1/Sum(1/i^a)
| [<a href="#ref-Barford98">Barford98</a>] | | a: distribution slope
| [<a href="#ref-Barford99">Barford99</a>] | Exact timing via | values 0.64-0.84
| | exponential | [<a href="#ref-Breslau99">Breslau99</a>] [<a href="#ref-Mahanti00">Mahanti00</a>]
| | distribution |
| | [<a href="#ref-Arlitt97" title=""Internet web servers: workload characterization and performance implications"">Arlitt97</a>] |
---------------------------------------------------------------------
VoD | Duration/size: | No analytical models | Weibull: k=0.513,
| Concatenated | | lambda=6010
| normal; most | Random distribution |
| videos | across total | Gamma: k=0.372,
| ~330 kbit/s | duration | theta=23910
| [<a href="#ref-Cheng13" title=""Understanding the Characteristics of Internet Short Video Sharing: YouTube as a Case Study"">Cheng13</a>] | | [<a href="#ref-Cheng08" title=""Statistics and social network of YouTube videos"">Cheng08</a>]
---------------------------------------------------------------------
P2P | Wide variation | Mean arrival rate of | Mandelbrot-Zipf
| on torrent | 0.9454 torrents/hour | [<a href="#ref-Hefeeda08">Hefeeda08</a>]:
| sizes | Peers in a swarm | p(i)=K/((i+q)/a)
| [<a href="#ref-Hefeeda08">Hefeeda08</a>]. | arrive as | q: plateau factor,
| No analytical | l(t)= l0*e^(-t/tau) | 5 to 100.
| models exist: | l0: initial arrival | Flatter head than in
| Sample a real | rate (87.74 average) | Zipf-like distribution
| BitTorrent | tau: object | (where q=0)
| distribution | popularity |
| [<a href="#ref-Bellissimo04">Bellissimo04</a>] | (1.16 average)* |
| or use fixed | [<a href="#ref-Guo07" title=""A performance study of BitTorrent-like peer-to- peer systems"">Guo07</a>] |
| value | |
=====================================================================
* Random ordering of swarm births (first request). For each swarm,
calculate a different tau. Based on average tau and object
popularity. Exponential decay rule for subsequent requests.
Table 2: Overview of Traffic Type Models
Table 3 summarizes the content catalog. With this shared point of
reference, the use of the same set of parameters (depending on the
scenario of interest) among researchers will be eased, and different
proposals could be compared on a common base.
<span class="grey">Pentikousis, et al. Informational [Page 9]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-10" ></span>
<span class="grey"><a href="./rfc7945">RFC 7945</a> ICN Evaluation and Security September 2016</span>
Traffic | Catalog | Mean Object Size | Popularity Distribution
Load | Size | [<a href="#ref-Zhou11" title=""Counting YouTube videos via random prefix sampling"">Zhou11</a>] [<a href="#ref-Fri12" title=""Impact of traffic mix on caching performance in a content-centric network"">Fri12</a>] | [<a href="#ref-Cha07" title=""I tube, you tube, everybody tubes: analyzing the world's largest user generated content video system"">Cha07</a>] [<a href="#ref-Fri12" title=""Impact of traffic mix on caching performance in a content-centric network"">Fri12</a>] [<a href="#ref-Yu06" title=""Understanding user behavior in large-scale video-on-demand systems"">Yu06</a>]
|[<a href="#ref-Goog08" title=""Official Google Blog: We knew the web was big..."">Goog08</a>] | [<a href="#ref-Marciniak08">Marciniak08</a>] | [<a href="#ref-Breslau99">Breslau99</a>] [<a href="#ref-Mahanti00">Mahanti00</a>]
|[<a href="#ref-Zhang10a" title=""Unraveling the BitTorrent Ecosystem"">Zhang10a</a>]| [<a href="#ref-Bellissimo04">Bellissimo04</a>] |
|[<a href="#ref-Cha07" title=""I tube, you tube, everybody tubes: analyzing the world's largest user generated content video system"">Cha07</a>] | [<a href="#ref-Psaras11" title=""Modelling and Evaluation of CCN-Caching Trees"">Psaras11</a>] |
|[<a href="#ref-Fri12" title=""Impact of traffic mix on caching performance in a content-centric network"">Fri12</a>] | [<a href="#ref-Carofiglio11">Carofiglio11</a>] |
| | |
| | |
| | |
===================================================================
Web | 10^12 | Chunk: 1-10 KB | Zipf with
| | | 0.64 <= alpha <= 0.83
-------------------------------------------------------------------
File | 5x10^6 | Chunk: 250-4096 KB | Zipf with
sharing | | Object: ~800 MB | 0.75 <= alpha <= 0.82
-------------------------------------------------------------------
UGC | 10^8 | Object: ~10 MB | Zipf, alpha >= 2
-------------------------------------------------------------------
VoD | 10^4 | Object: ~100 MB | Zipf, 0.65 <= alpha <= 1
(+HLS) | | ~1 KB (*) |
(+DASH) | | ~5.6 KB (*) |
===================================================================
UGC = User-Generated Content
VoD = Video on Demand
HLS = HTTP Live Streaming
DASH = Dynamic Adaptive Streaming over HTTP
(*) Using adaptive video streaming (e.g., HLS and DASH), with an
optimal segment length (10 s for HLS and 2 s for DASH) and a
bitrate of 4500 kbit/s [<a href="./rfc7933" title=""Adaptive Video Streaming over Information-Centric Networking (ICN)"">RFC7933</a>] [<a href="#ref-Led12" title=""Dynamic adaptive streaming over HTTP dataset"">Led12</a>]
Table 3: Content Catalog
<span class="h3"><a class="selflink" id="section-2.3" href="#section-2.3">2.3</a>. Choosing Relevant Metrics</span>
Quantification of network performance requires a set of standard
metrics. These metrics should be broad enough so they can be applied
equally to host-centric and information-centric (or other) networks.
This will allow reasoning about a certain ICN approach in relation to
an earlier version of the same approach, to another ICN approach, or
to the incumbent host-centric approach. It will therefore be less
difficult to gauge optimization and research direction. On the other
hand, the metrics should be targeted to network performance only and
should avoid unnecessary expansion into the physical and application
layers. Similarly, at this point, it is more important to capture as
metrics only the main figures of merit and to leave more esoteric and
less frequent cases for the future.
<span class="grey">Pentikousis, et al. Informational [Page 10]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-11" ></span>
<span class="grey"><a href="./rfc7945">RFC 7945</a> ICN Evaluation and Security September 2016</span>
To arrive at a set of relevant metrics, it would be beneficial to
look at the metrics used in existing ICN approaches, such as Content-
Centric Networking (CCN) [<a href="#ref-Jacobson09">Jacobson09</a>] [<a href="#ref-VoCCN" title=""VoCCN: Voice-over Content-Centric Networks"">VoCCN</a>] [<a href="#ref-Zhang10b" title=""Named Data Networking (NDN) Project"">Zhang10b</a>], NetInf
[<a href="#ref-4WARD6.1" title=""First NetInf Architecture Description"">4WARD6.1</a>] [<a href="#ref-4WARD6.3" title=""NetInf Evaluation"">4WARD6.3</a>] [<a href="#ref-SAIL-B2" title=""NetInf Content Delivery and Operations"">SAIL-B2</a>] [<a href="#ref-SAIL-B3" title=""Final NetInf Architecture"">SAIL-B3</a>], PURSUIT [<a href="#ref-PRST4.5" title=""Final Architecture Validation and Performance Evaluation Report"">PRST4.5</a>], COMET
[<a href="#ref-CMT-D5.2" title=""Scalability of COMET System"">CMT-D5.2</a>] [<a href="#ref-CMT-D6.2" title=""Prototype Experimentation and Demonstration"">CMT-D6.2</a>], Connect [<a href="#ref-Muscariello11">Muscariello11</a>] [<a href="#ref-Perino11" title=""A Reality Check for Content Centric Networking"">Perino11</a>], and
CONVERGENCE [<a href="#ref-Detti12" title=""Supporting the Web with an Information Centric Network that Routes by Name"">Detti12</a>] [<a href="#ref-Blefari-Melazzi12">Blefari-Melazzi12</a>] [<a href="#ref-Salsano12">Salsano12</a>]. The metrics
used in these approaches fall into two categories: metrics for the
approach as a whole, and metrics for individual components (name
resolution, routing, and so on). Metrics for the entire approach are
further subdivided into traffic and system metrics. It is important
to note that the various approaches do not name or define metrics
consistently. This is a major problem when trying to find metrics
that allow comparison between approaches. For the purposes of
exposition, we have tried to smooth over differences by classifying
similarly defined metrics under the same name. Also, due to space
constraints, we have chosen to report here only the most common
metrics between approaches. For more details, the reader should
consult the references for each approach.
Traffic metrics in existing ICN approaches are summarized in Table 4.
These are metrics for evaluating an approach mainly from the
perspective of the end user, i.e., the consumer, provider, or owner
of the content or service. Depending on the level where these
metrics are measured, we have made the distinction into user,
application, and network-level traffic metrics. So, for example,
network-level metrics are mostly focused on packet characteristics,
whereas user-level metrics can cover elements of human perception.
The approaches do not make this distinction explicitly, but we can
see from the table that CCN and NetInf have used metrics from all
levels, PURSUIT and COMET have focused on lower-level metrics, and
Connect and CONVERGENCE opted for higher-level metrics. Throughput
and download time seem to be the most popular metrics altogether.
<span class="grey">Pentikousis, et al. Informational [Page 11]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-12" ></span>
<span class="grey"><a href="./rfc7945">RFC 7945</a> ICN Evaluation and Security September 2016</span>
User | Application | Network
======================================================
Download | Goodput | Startup | Throughput | Packet
time | | latency | | delay
==================================================================
CCN | x | x | | x | x
------------------------------------------------------------------
NetInf | x | | x | x | x
------------------------------------------------------------------
PURSUIT | | | x | x | x
------------------------------------------------------------------
COMET | | | x | x |
------------------------------------------------------------------
Connect | x | | | |
------------------------------------------------------------------
CONVERGENCE | x | x | | |
==================================================================
Table 4: Traffic Metrics Used in ICN Evaluations
While traffic metrics are more important for the end user, the owner
or operator of the networking infrastructure is normally more
interested in system metrics, which can reveal the efficiency of an
approach. The most common system metrics used are: protocol
overhead, total traffic, transit traffic, cost savings, router cost,
and router energy consumption.
Besides the traffic and systems metrics that aim to evaluate an
approach as a whole, all surveyed approaches also evaluate the
performance of individual components. Name resolution, request/data
routing, and data caching are the most typical components, as
summarized in Table 5. Forwarding Information Base (FIB) size and
path length, i.e., the routing component metrics, are almost
ubiquitous among approaches, perhaps due to the networking background
of the involved researchers. That might be also the reason for the
sometimes decreased focus on traffic and system metrics, in favor of
component metrics. It can certainly be argued that traffic and
system metrics are affected by component metrics; however, no
approach has made the relationship clear. With this in mind and
taking into account that traffic and system metrics are readily
useful to end users and network operators, we will restrict ourselves
to those in the following subsections.
<span class="grey">Pentikousis, et al. Informational [Page 12]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-13" ></span>
<span class="grey"><a href="./rfc7945">RFC 7945</a> ICN Evaluation and Security September 2016</span>
Resolution | Routing | Cache
======================================================
Resolution | Request | FIB | Path | Size | Hit
time | rate | size | length | | ratio
==================================================================
CCN | x | | x | x | x | x
------------------------------------------------------------------
NetInf | x | x | | x | | x
------------------------------------------------------------------
PURSUIT | | | x | x | |
------------------------------------------------------------------
COMET | x | x | x | x | | x
------------------------------------------------------------------
CONVERGENCE | | x | x | | x |
==================================================================
Table 5: Component Metrics in Existing ICN Approaches
Before proceeding, we should note that we would like our metrics to
be applicable to host-centric networks as well. Standard metrics
already exist for IP networks, and it would certainly be beneficial
to take them into account. It is encouraging that many of the
metrics used by existing ICN approaches can also be used on IP
networks and that all of the approaches have tried on occasion to
draw the parallels.
<span class="h4"><a class="selflink" id="section-2.3.1" href="#section-2.3.1">2.3.1</a>. Traffic Metrics</span>
The IETF has been working for more than a decade on devising metrics
and methods for measuring the performance of IP networks. The work
has been carried out largely within the IP Performance Metrics (IPPM)
working group, guided by a relevant framework [<a href="./rfc2330" title=""Framework for IP Performance Metrics"">RFC2330</a>]. IPPM
metrics include delay, delay variation, loss, reordering, and
duplication. While the IPPM work is certainly based on packet-
switched IP networks, it is conceivable that it can be modified and
extended to cover ICN networks as well. However, more study is
necessary to turn this claim into a certainty. Many experts have
toiled for a long time on devising and refining the IPPM metrics and
methods, so it would be an advantage to use them for measuring ICN
performance. In addition, said metrics and methods work already for
host-centric networks, so comparison with information-centric
networks would entail only the ICN extension of the IPPM framework.
Finally, an important benefit of measuring the transport performance
of a network at its output, using Quality of Service (QoS) metrics
such as IPPM, is that it can be done mostly without any dependence to
applications.
<span class="grey">Pentikousis, et al. Informational [Page 13]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-14" ></span>
<span class="grey"><a href="./rfc7945">RFC 7945</a> ICN Evaluation and Security September 2016</span>
Another option for measuring transport performance would be to use
QoS metrics, not at the output of the network like with IPPM, but at
the input to the application. For a live video-streaming application
the relevant metrics would be startup latency, playout lag, and
playout continuity. The benefit of this approach is that it
abstracts away all details of the underlying transport network, so it
can be readily applied to compare between networks of different
concepts (host-centric, information-centric, or other). As implied
earlier, the drawback of the approach is its dependence on the
application, so it is likely that different types of applications
will require different metrics. It might be possible to identify
standard metrics for each type of application, but the situation is
not as clear as with IPPM metrics, and further investigation is
necessary.
At a higher level of abstraction, we could measure the network's
transport performance at the application output. This entails
measuring the quality of the transported and reconstructed
information as perceived by the user during consumption. In such an
instance we would use Quality of Experience (QoE) metrics, which are
by definition dependent on the application. For example, the
standardized methods for obtaining a Mean Opinion Score (MOS) for
VoIP (e.g., ITU-T Recommendation P.800) is quite different from those
for IPTV (e.g., Perceptual Evaluation of Video Quality (PEVQ)).
These methods are notoriously hard to implement, as they involve real
users in a controlled environment. Such constraints can be relaxed
or dropped by using methods that model human perception under certain
environments, but these methods are typically intrusive. The most
important drawback of measuring network performance at the output of
the application is that only one part of each measurement is related
to network performance. The rest is related to application
performance, e.g., video coding, or even device capabilities, both of
which are irrelevant to our purposes here and are generally hard to
separate. We therefore see the use of QoE metrics in measuring ICN
performance as a poor choice at this stage.
<span class="h4"><a class="selflink" id="section-2.3.2" href="#section-2.3.2">2.3.2</a>. System Metrics</span>
Overall system metrics that need to be considered include
reliability, scalability, energy efficiency, and delay/disconnection
tolerance. In deployments where ICN is addressing specific
scenarios, relevant system metrics could be derived from current
experience. For example, in Internet of Things (IoT) scenarios,
which are discussed in [<a href="./rfc7476" title=""Information-Centric Networking: Baseline Scenarios"">RFC7476</a>], it is reasonable to consider the
current generation of sensor nodes, sources of information, and even
measurement gateways (e.g., for smart metering at homes) or
smartphones. In this case, ICN operation ought to be evaluated with
respect not only to overall scalability and network efficiency, but
<span class="grey">Pentikousis, et al. Informational [Page 14]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-15" ></span>
<span class="grey"><a href="./rfc7945">RFC 7945</a> ICN Evaluation and Security September 2016</span>
also the impact on the nodes themselves. Karnouskos et al.
[<a href="#ref-SensReqs" title=""Requirement considerations for ubiquitous integration of cooperating objects"">SensReqs</a>] provide a comprehensive set of sensor and IoT-related
requirements, for example, which include aspects such as resource
utilization, service life-cycle management, and device management.
Additionally, various specific metrics are also critical in
constrained environments, such as processing requirements, signaling
overhead, and memory allocation for caching procedures, in addition
to power consumption and battery lifetime. For gateways (which
typically act as a point of service to a large number of nodes and
have to satisfy the information requests from remote entities), we
need to consider scalability-related metrics, such as frequency and
processing of successfully satisfied information requests.
Finally, given the in-network caching functionality of ICNs,
efficiency and performance metrics of in-network caching have to be
defined. Such metrics will need to guide researchers and operators
regarding the performance of in-network caching algorithms. A first
step on this direction has been made in [<a href="#ref-Psaras11" title=""Modelling and Evaluation of CCN-Caching Trees"">Psaras11</a>]. The paper
proposes a formula that approximates the proportion of time that a
piece of content stays in a network cache. The model takes as input
the rate of requests for a given piece of content (the Content of
Interest (CoI)) and the rate of requests for all other contents that
go through the given network element (router) and move the CoI down
in the (LRU) cache. The formula takes also into account the size of
the cache of this router.
The output of the model essentially reflects the probability that the
CoI will be found in a given cache. An initial study [<a href="#ref-Psaras11" title=""Modelling and Evaluation of CCN-Caching Trees"">Psaras11</a>] is
applied to the CCN / Named Data Networking (NDN) framework, where
contents get cached at every node they traverse. The formula
according to which the probability or proportion is calculated is
given by:
pi = [mu / (mu + lambda)]^N
where lambda is the request rate for the CoI, mu is the request rate
for contents that move the CoI down the cache, and N is the size of
the cache (in slots).
The formula can be used to assess the caching performance of the
system and can also potentially be used to identify the gain of the
system due to caching. This can then be used to compare against
gains by other factors, e.g., addition of extra bandwidth in the
network.
<span class="grey">Pentikousis, et al. Informational [Page 15]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-16" ></span>
<span class="grey"><a href="./rfc7945">RFC 7945</a> ICN Evaluation and Security September 2016</span>
<span class="h3"><a class="selflink" id="section-2.4" href="#section-2.4">2.4</a>. Resource Equivalence and Trade-Offs</span>
As we have seen above, every ICN network is built from a set of
resources, which include link capacities, and different types of
memory structures and repositories used for storing named data
objects and chunks temporarily (i.e., caching) or persistently, as
well as name resolution and other lookup services. A range of
engineering trade-offs arise from the complexity and processing
requirements of forwarding decisions, management needs (e.g., manual
configuration, explicit garbage collection), and routing needs (e.g.,
amount of state, manual configuration of routing tables, support for
mobility).
In order to be able to compare different ICN approaches, it would be
beneficial to be able to define equivalence in terms of different
resources that today are considered incomparable. For example, would
provisioning an additional 5 Mbit/s link capacity lead to better
performance than adding 100 GB of in-network storage? Within this
context, one would consider resource equivalence (and the associated
trade-offs) -- for example, for cache hit ratios per GB of cache,
forwarding decision times, CPU cycles per forwarding decision, and so
on.
<span class="h2"><a class="selflink" id="section-3" href="#section-3">3</a>. ICN Security Aspects</span>
The introduction of an information-centric networking architecture
and the corresponding communication paradigm results in changes to
many aspects of network security. These will affect all scenarios
described in [<a href="./rfc7476" title=""Information-Centric Networking: Baseline Scenarios"">RFC7476</a>]. Additional evaluation will be required to
ensure relevant security requirements are appropriately met by the
implementation of the chosen architecture in the various scenarios.
The ICN security aspects described in this document reflect the ICN
security challenges outlined in [<a href="./rfc7927" title=""Information-Centric Networking (ICN) Research Challenges"">RFC7927</a>].
The ICN architectures currently proposed have concentrated on
authentication of delivered content to ensure its integrity. Even
though the approaches are primarily applicable to freely accessible
content that does not require access authorization, they will
generally support delivery of encrypted content.
The introduction of widespread caching mechanisms may also provide
additional attack surfaces. The caching architecture to be used also
needs to be evaluated to ensure that it meets the requirements of the
usage scenarios.
<span class="grey">Pentikousis, et al. Informational [Page 16]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-17" ></span>
<span class="grey"><a href="./rfc7945">RFC 7945</a> ICN Evaluation and Security September 2016</span>
In practice, the work on security in the various ICN research
projects has been heavily concentrated on authentication of content.
Work on authorization, access control, and privacy and security
threats due to the expanded role of in-network caches has been quite
limited. For example, a roadmap for improving the security model in
NetInf can be found in [<a href="#ref-Renault09">Renault09</a>]. As secure communications on the
Internet are becoming the norm, major gaps in ICN security aspects
are bound to undermine the adoption of ICN. A comprehensive overview
of ICN security is also provided in [<a href="#ref-Tourani16">Tourani16</a>].
In the following subsections, we briefly consider the issues and
provide pointers to the work that has been done on the security
aspects of the architectures proposed.
<span class="h3"><a class="selflink" id="section-3.1" href="#section-3.1">3.1</a>. Authentication</span>
For fully secure content distribution, content access requires that
the receiver be able to reliably assess:
validity: Is it a complete, uncorrupted copy of what was
originally published?
provenance: Can the receiver identify the publisher? If so, can it
and the source of any cached version of the document
be adequately trusted?
relevance: Is the content an answer to the question that the
receiver asked?
All ICN architectures considered in this document primarily target
the validity requirement using strong cryptographic means to tie the
content request name to the content. Provenance and relevance are
directly targeted to varying extents: There is a tussle or trade-off
between simplicity and efficiency of access and level of assurance of
all these traits. For example, maintaining provenance information
can become extremely costly, particularly when considering (historic)
relationships between multiple objects. Architectural decisions have
therefore been made in each case as to whether the assessment is
carried out by the information-centric network or left to the
application.
An additional consideration for authentication is whether a name
should be irrevocably and immutably tied to a static piece of
preexisting content or whether the name can be used to refer to
dynamically or subsequently generated content. Schemes that only
target immutable content can be less resource-hungry as they can use
digest functions rather than public key cryptography for generating
and checking signatures. However, this can increase the load on
<span class="grey">Pentikousis, et al. Informational [Page 17]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-18" ></span>
<span class="grey"><a href="./rfc7945">RFC 7945</a> ICN Evaluation and Security September 2016</span>
applications because they are required to manage many names, rather
than use a single name for an item of evolving content that changes
over time (e.g., a piece of data containing an age reference).
Data-Oriented Network Architecture (DONA) [<a href="#ref-DONA" title=""A Data-Oriented (and Beyond) Network Architecture"">DONA</a>] and CCN [<a href="#ref-Jacobson09">Jacobson09</a>]
[<a href="#ref-Smetters09">Smetters09</a>] integrate most of the data needed to verify provenance
into all content retrievals but need to be able to retrieve
additional information (typically a security certificate) in order to
complete the provenance authentication. Whether the application has
any control of this extra retrieval will depend on the
implementation. CCN is explicitly designed to handle dynamic content
allowing names to be pre-allocated and attached to subsequently
generated content. DONA offers variants for dynamic and immutable
content.
Publish-Subscribe Internet Technology (PURSUIT) [<a href="#ref-Tagger12" title=""Update on the Architecture and Report on Security Analysis"">Tagger12</a>] appears to
allow implementers to choose the authentication mechanism so that it
can, in theory, emulate the authentication strategy of any of the
other architectures. It is not clear whether different choices would
lead to lack of interoperability.
NetInf uses the Named Information (ni) URI scheme [<a href="./rfc6920" title=""Naming Things with Hashes"">RFC6920</a>] to
identify content. This allows NetInf to assure validity without any
additional information but gives no assurance on provenance or
relevance. A "search" request allows an application to identify
relevant content, and applications may choose to structure content to
allow provenance assurance, but this will typically require
additional network access. NetInf validity authentication is
consequently efficient in a network environment with intermittent
connectivity as it does not force additional network accesses and
allows the application to decide on provenance validation if
required. For dynamic content, NetInf can use, e.g., signed
manifests. For more details on NetInf security, see [<a href="#ref-Dannewitz10">Dannewitz10</a>].
<span class="h3"><a class="selflink" id="section-3.2" href="#section-3.2">3.2</a>. Authorization, Access Control, and Logging</span>
A potentially major concern for all ICN architectures considered here
is that they do not provide any inbuilt support for an authorization
framework or for logging. Once content has been published and cached
in servers, routers, or endpoints not controlled by the publisher,
the publisher has no way to enforce access control, determine which
users have accessed the content, or revoke its publication. In fact,
in some cases (where requests do not necessarily contain host/user
identifier information), it is difficult for the publishers
themselves to perform access control.
<span class="grey">Pentikousis, et al. Informational [Page 18]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-19" ></span>
<span class="grey"><a href="./rfc7945">RFC 7945</a> ICN Evaluation and Security September 2016</span>
Access could be limited by encrypting the content, but the necessity
of distributing keys out-of-band appears to negate the advantages of
in-network caching. This also creates significant challenges when
attempting to manage and restrict key access. An authorization
delegation scheme has been proposed [<a href="#ref-Fotiou12" title=""Access control enforcement delegation for information-centric networking architectures"">Fotiou12</a>]. This scheme allows
semi-trusted entities (such as caches or CDN nodes) to delegate
access control decisions to third-party access control providers that
are trusted by the content publisher. The former entities have no
access to subscriber-related information and should respect the
decisions of the access control providers.
A recent proposal for an extra layer in the protocol stack [<a href="#ref-LIRA" title=""Lira: A location independent routing layer based on source- provided ephemeral names"">LIRA</a>]
gives control of the name resolution infrastructure to the publisher.
This enables access logging as well some degree of active cache
management, e.g., purging of stale content.
One possible technique that could allow for providing access control
to heterogeneous groups and still allow for a single encrypted object
representation that remains cacheable is Attribute-Based Encryption
(ABE). A first proposal for this is presented in [<a href="#ref-Ion13" title=""Toward content- centric privacy in ICN: attribute-based encryption and routing"">Ion13</a>]. To
support heterogeneous groups and avoid having a single authority that
has a master key multi-authority, ABE can be used [<a href="#ref-Lewko11" title=""Decentralizing attribute-based encryption"">Lewko11</a>].
Evaluating the impact of the absence of these features will be
essential for any scenario where an ICN architecture might be
deployed. It may have a seriously negative impact on the
applicability of ICN in commercial environments unless a solution can
be found.
<span class="h3"><a class="selflink" id="section-3.3" href="#section-3.3">3.3</a>. Privacy</span>
Another area where the architectures have not been significantly
analyzed is privacy. Caching implies a trade-off between network
efficiency and privacy. The activity of users is significantly more
exposed to the scrutiny of cache owners with whom they may not have
any relationship. However, it should be noted that it is only the
first-hop router/cache that can see who requests what, as requests
are aggregated and only the previous-hop router is visible when a
request is forwarded.
Although in many ICN architectures the source of a request is not
explicitly identified, an attacker may be able to obtain considerable
information if he or she can monitor transactions on the cache and
obtain details of the objects accessed, the topological direction of
requests, and information about the timing of transactions. The
persistence of data in the cache can make life easier for an attacker
by giving a longer timescale for analysis.
<span class="grey">Pentikousis, et al. Informational [Page 19]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-20" ></span>
<span class="grey"><a href="./rfc7945">RFC 7945</a> ICN Evaluation and Security September 2016</span>
The impact of CCN on privacy has been investigated in [<a href="#ref-Lauinger10">Lauinger10</a>],
and the analysis is applicable to all ICN architectures because it is
mostly focused on the common caching aspect. The privacy risks of
Named Data Networking are also highlighted in [<a href="#ref-Lauinger12">Lauinger12</a>]. Further
work on privacy in ICNs can be found in [<a href="#ref-Chaabane13">Chaabane13</a>]. Finally,
Fotiou et al. define an ICN privacy evaluation framework in
[<a href="#ref-Fotiou14" title=""A framework for privacy analysis of ICN architectures"">Fotiou14</a>].
<span class="h3"><a class="selflink" id="section-3.4" href="#section-3.4">3.4</a>. Changes to the Network Security Threat Model</span>
The architectural differences of the various ICN models versus TCP/IP
have consequences for network security. There is limited
consideration of the threat models and potential mitigation in the
various documents describing the architectures. [<a href="#ref-Lauinger10">Lauinger10</a>] and
[<a href="#ref-Chaabane13">Chaabane13</a>] also consider the changed threat model. Some of the key
aspects are:
o Caching implies a trade-off between network efficiency and user
privacy as discussed in <a href="#section-3.3">Section 3.3</a>.
o More-powerful routers upgraded to handle persistent caching
increase the network's attack surface. This is particularly
the case in systems that may need to perform cryptographic
checks on content that is being cached. For example, not doing
this could lead routers to disseminate invalid content.
o ICNs makes it difficult to identify the origin of a request (as
mentioned in <a href="#section-3.3">Section 3.3</a>), slowing down the process of blocking
requests and requiring alternative mechanisms to differentiate
legitimate requests from inappropriate ones as access control
lists (ACLs) will probably be of little value for ICN requests.
o Denial-of-service (DoS) attacks may require more effort on ICN
than on TCP/IP-based host-centric networks, but they are still
feasible. One reason for this is that it is difficult for the
attacker to force repeated requests for the same content onto a
single node; ICNs naturally spread content so that after the
initial few requests, subsequent requests will generally be
satisfied by alternative sources, blunting the impact of a DoS
attack. That said, there are many ways around this, e.g.,
generating random suffix identifiers that always result in
cache misses.
o Per-request state in routers can be abused for DoS attacks.
<span class="grey">Pentikousis, et al. Informational [Page 20]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-21" ></span>
<span class="grey"><a href="./rfc7945">RFC 7945</a> ICN Evaluation and Security September 2016</span>
o Caches can be misused in the following ways:
+ Attackers can use caches as storage to make their own
content available.
+ The efficiency of caches can be decreased by attackers with
the goal of DoS attacks.
+ Content can be extracted by any attacker connected to the
cache, putting users' privacy at risk.
Appropriate mitigation of these threats will need to be considered in
each scenario.
<span class="h2"><a class="selflink" id="section-4" href="#section-4">4</a>. Evaluation Tools</span>
Since ICN is an emerging area, the community is in the process of
developing effective evaluation environments, including releasing
open-source implementations, simulators, emulators, and testbeds. To
date, none of the available evaluation tools can be seen as the one
and only community reference evaluation tool. Furthermore, no single
environment supports all well-known ICN approaches, as we describe
below, hindering the direct comparison of the results obtained for
different ICN approaches. The subsections that follow review the
currently publicly available ICN implementations, simulators, and
experimental facilities.
An updated list of the available evaluation tools will be maintained
at the ICNRG Wiki page: <<a href="https://trac.tools.ietf.org/group/irtf/trac/wiki/IcnEvaluationAndTestbeds">https://trac.tools.ietf.org/group/irtf/trac/</a>
<a href="https://trac.tools.ietf.org/group/irtf/trac/wiki/IcnEvaluationAndTestbeds">wiki/IcnEvaluationAndTestbeds</a>>
<span class="h3"><a class="selflink" id="section-4.1" href="#section-4.1">4.1</a>. Open-Source Implementations</span>
The Named Data Networking (NDN) project has open-sourced a software
reference implementation of the architecture and protocol called NDN
(<a href="http://named-data.net">http://named-data.net</a>). NDN is available for deployment on various
operating systems and includes C and Java libraries that can be used
to build applications.
CCN-lite (<a href="http://www.ccn-lite.net">http://www.ccn-lite.net</a>) is a lightweight implementation of
the CCN protocol that supports most of the key features of CCNx and
is interoperable with CCNx. CCN-lite implements the core CCN logic
in about 1000 lines of code, so it is ideal for classroom work and
course projects as well as for quickly experimenting with CCN
extensions. For example, Baccelli et al. use CCN-lite on top of the
RIOT operating system to conduct experiments over an IoT testbed
[<a href="#ref-Baccelli14">Baccelli14</a>].
<span class="grey">Pentikousis, et al. Informational [Page 21]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-22" ></span>
<span class="grey"><a href="./rfc7945">RFC 7945</a> ICN Evaluation and Security September 2016</span>
PARC is offering CCN source code under various licensing schemes,
please see <<a href="http://www.ccnx.org">http://www.ccnx.org</a>> for details.
The PURSUIT project (<a href="http://www.fp7-pursuit.eu">http://www.fp7-pursuit.eu</a>) has open-sourced its
Blackhawk publish-subscribe (Pub/Sub) implementation for Linux and
Android; more details are available at
<<a href="https://github.com/fp7-pursuit/blackadder">https://github.com/fp7-pursuit/blackadder</a>>. Blackadder uses the
Click modular router for ease of development. The code distribution
features a set of tools, test applications, and scripts. The POINT
project (<a href="http://www.point-h2020.eu">http://www.point-h2020.eu</a>) is currently maintaining
Blackadder.
The 4WARD and SAIL projects have open-sourced software that
implements different aspects of NetInf, e.g., the NetInf URI format
and HTTP and UDP convergence layer, using different programming
languages. The Java implementation provides a local caching proxy
and client. Further, an OpenNetInf prototype is available as well as
a hybrid host-centric and information-centric network architecture
called the Global Information Network (GIN), a browser plug-in and
video-streaming software. See <<a href="http://www.netinf.org/open-source">http://www.netinf.org/open-source</a>>
for more details.
<span class="h3"><a class="selflink" id="section-4.2" href="#section-4.2">4.2</a>. Simulators and Emulators</span>
Simulators and emulators should be able to capture faithfully all
features and operations of the respective ICN architecture(s) and any
limitations should be openly documented. It is essential that these
tools and environments come with adequate logging facilities so that
one can use them for in-depth analysis as well as debugging.
Additional requirements include the ability to support medium- to
large-scale experiments, the ability to quickly and correctly set
various configurations and parameters, as well as to support the
playback of traffic traces captured on a real testbed or network.
Obviously, this does not even begin to touch upon the need for strong
validation of any evaluated implementations.
<span class="h4"><a class="selflink" id="section-4.2.1" href="#section-4.2.1">4.2.1</a>. ndnSIM</span>
The Named Data Networking (NDN) project (<a href="http://named-data.net">http://named-data.net</a>) has
developed ndnSIM [<a href="#ref-ndnSIM" title=""ndnSIM: NDN simulator for NS-3"">ndnSIM</a>] [<a href="#ref-ndnSIM2" title=""ndnSIM 2.0: A new version of the NDN simulator for NS-3"">ndnSIM2</a>]; this is a module that can be
plugged into the ns-3 simulator (<a href="https://www.nsnam.org">https://www.nsnam.org</a>) and supports
the core features of NDN. One can use ndnSIM to experiment with
various NDN applications and services as well as components developed
for NDN such as routing protocols and caching and forwarding
strategies, among others. The code for ns-3 and ndnSIM is openly
available to the community and can be used as the basis for
implementing ICN protocols or applications. For more details, see
<<a href="http://ndnsim.net/2.0/">http://ndnsim.net/2.0/</a>>.
<span class="grey">Pentikousis, et al. Informational [Page 22]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-23" ></span>
<span class="grey"><a href="./rfc7945">RFC 7945</a> ICN Evaluation and Security September 2016</span>
<span class="h4"><a class="selflink" id="section-4.2.2" href="#section-4.2.2">4.2.2</a>. ccnSIM</span>
ccnSim [<a href="#ref-ccnSim" title=""Large scale simulation of CCN networks"">ccnSim</a>] is a CCN-specific simulator that was specially
designed to handle forwarding of a large number of CCN-chunks
(<a href="http://www.infres.enst.fr/~drossi/index.php?n=Software.ccnSim">http://www.infres.enst.fr/~drossi/index.php?n=Software.ccnSim</a>).
ccnSim is written in C++ for the OMNeT++ simulation framework
(<a href="https://omnetpp.org">https://omnetpp.org</a>). Other CCN-specific simulators include the CCN
Packet-Level Simulator [<a href="#ref-CCNPL" title=""CCNPL- SIM"">CCNPL</a>] and CCN-Joker [<a href="#ref-Cianci12" title=""CCN - Java Opensource Kit EmulatoR for Wireless Ad Hoc Networks"">Cianci12</a>]. CCN-Joker
emulates in user space all basic aspects of a CCN node (e.g.,
handling of Interest and Data packets, cache sizing, replacement
policies), including both flow and congestion control. The code is
open source and is suitable for both emulation-based analyses and
real experiments. Finally, Cabral et al. [<a href="#ref-MiniCCNx" title=""High fidelity content-centric experiments with Mini-CCNx"">MiniCCNx</a>] use container-
based emulation and resource isolation techniques to develop a
prototyping and emulation tool.
<span class="h4"><a class="selflink" id="section-4.2.3" href="#section-4.2.3">4.2.3</a>. Icarus Simulator</span>
The Icarus simulator [<a href="#ref-ICARUS" title=""Icarus: a Caching Simulator for Information Centric Networking (ICN)"">ICARUS</a>] focuses on caching in ICN and is
agnostic with respect to any particular ICN implementation. The
simulator is implemented in Python, uses the Fast Network Simulator
Setup tool [<a href="#ref-Saino13" title=""A Toolchain for Simplifying Network Simulation Setup"">Saino13</a>], and is available at
<<a href="http://icarus-sim.github.io">http://icarus-sim.github.io</a>>. Icarus has several caching strategies
implemented, including among others ProbCache [<a href="#ref-Psaras12" title=""Probabilistic In- Network Caching for Information-Centric Networks"">Psaras12</a>], node-
centrality-based caching [<a href="#ref-Chai12" title=""Cache 'Less for More' in Information-centric Networks"">Chai12</a>], and hash-route-based caching
[<a href="#ref-HASHROUT" title=""Hash-routing Schemes for Information-Centric Networking"">HASHROUT</a>].
ProbCache [<a href="#ref-Psaras12" title=""Probabilistic In- Network Caching for Information-Centric Networks"">Psaras12</a>] is taking a resource management view on caching
decisions and approximates the available cache capacity along the
path from source to destination. Based on this approximation and in
order to reduce caching redundancy across the path, it caches content
probabilistically. According to [<a href="#ref-Chai12" title=""Cache 'Less for More' in Information-centric Networks"">Chai12</a>], the node with the highest
"betweenness centrality" along the path from source to destination is
responsible for caching incoming content. Finally, [<a href="#ref-HASHROUT" title=""Hash-routing Schemes for Information-Centric Networking"">HASHROUT</a>]
calculates the hash function of a content's name and assigns contents
to caches of a domain according to that. The hash space is split
according to the number of caches of the network. Then, upon
subsequent requests, and based again on the hash of the name included
in the request, edge routers redirect requests to the cache assigned
with the corresponding hash space. [<a href="#ref-HASHROUT" title=""Hash-routing Schemes for Information-Centric Networking"">HASHROUT</a>] is an off-path caching
strategy; in contrast to [<a href="#ref-Psaras12" title=""Probabilistic In- Network Caching for Information-Centric Networks"">Psaras12</a>] and [<a href="#ref-Chai12" title=""Cache 'Less for More' in Information-centric Networks"">Chai12</a>], it requires minimum
coordination and redirection overhead. In its latest update, Icarus
also includes implementation of the "Satisfied Interest Table" (SIT)
[<a href="#ref-Sourlas15">Sourlas15</a>]. The SIT points in the direction where content has been
sent recently. Among other benefits, this enables information
resilience in case of network fragmentation (i.e., content can still
<span class="grey">Pentikousis, et al. Informational [Page 23]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-24" ></span>
<span class="grey"><a href="./rfc7945">RFC 7945</a> ICN Evaluation and Security September 2016</span>
be found in neighbor caches or in users' devices) and inherently
supports user-assisted caching (i.e., P2P-like content distribution).
Tortelli et al. [<a href="#ref-ICNSIMS" title=""CCN Simulators: Analysis and Cross- Comparison"">ICNSIMS</a>] provide a comparison of ndnSIM, ccnSim, and
Icarus.
<span class="h3"><a class="selflink" id="section-4.3" href="#section-4.3">4.3</a>. Experimental Facilities</span>
An important consideration in the evaluation of any kind of future
Internet mechanism lies in the characteristics of that evaluation
itself. Central to the assessment of the features provided by a
novel mechanism is the consideration of how it improves over already
existing technologies, and by "how much". With the disruptive nature
of clean-slate approaches generating new and different technological
requirements, it is complex to provide meaningful results for a
network-layer framework, in comparison with what is deployed in the
current Internet. Thus, despite the availability of ICN
implementations and simulators, the need for large-scale environments
supporting experimental evaluation of novel research is of prime
importance to the advancement of ICN deployment.
Different experimental facilities have different characteristics and
capabilities, e.g., having low cost of use, reproducible
configuration, easy-to-use tools, and available background traffic,
and being sharable.
<span class="h4"><a class="selflink" id="section-4.3.1" href="#section-4.3.1">4.3.1</a>. Open Network Lab (ONL)</span>
An example of an experimental facility that supports CCN is the Open
Network Lab [<a href="#ref-ONL" title=""The open network laboratory: a resource for networking research and education"">ONL</a>] that currently comprises 18 extensible gigabit
routers and over a 100 computers representing clients and is freely
available to the public for running CCN experiments. Nodes in ONL
are preloaded with CCNx software. ONL provides a graphical user
interface for easy configuration and testbed setup as per the
experiment requirements, and also serves as a control mechanism,
allowing access to various control variables and traffic counters.
Further, it is also possible to run and evaluate CCN over popular
testbeds [<a href="#ref-PLANETLAB">PLANETLAB</a>] [<a href="#ref-EMULAB" title=""An Experimentation Workbench for Replayable Networking Research"">EMULAB</a>] [<a href="#ref-DETERLAB" title=""The Science of Cyber-Security Experimentation: The DETER Project"">DETERLAB</a>] [<a href="#ref-OFELIA" title=""Design and implementation of the OFELIA FP7 facility: The European OpenFlow testbed"">OFELIA</a>] by directly
running, for example, the CCNx open-source code [<a href="#ref-Salsano13">Salsano13</a>]
[<a href="#ref-Carofiglio13">Carofiglio13</a>] [<a href="#ref-Awiphan13">Awiphan13</a>] [<a href="#ref-Bernardini14">Bernardini14</a>]. Also, the Network
Experimentation Programming Interface (NEPI) [<a href="#ref-NEPI" title=""NEPI: An integration framework for Network Experimentation"">NEPI</a>] is a tool
developed for controlling and managing large-scale network
experiments. NEPI can be used to control and manage large-scale CCNx
experiments, e.g., on PlanetLab [<a href="#ref-Quereilhac14">Quereilhac14</a>].
<span class="grey">Pentikousis, et al. Informational [Page 24]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-25" ></span>
<span class="grey"><a href="./rfc7945">RFC 7945</a> ICN Evaluation and Security September 2016</span>
<span class="h4"><a class="selflink" id="section-4.3.2" href="#section-4.3.2">4.3.2</a>. POINT Testbed</span>
The POINT project is maintaining a testbed with 40 machines across
Europe, North America (Massachusetts Institute of Technology (MIT)),
and Japan (National Institute of Information and Communications
Technology (NICT)) interconnected in a topology containing one
Topology Manager and one rendezvous node that handle all
publish/subscribe and topology formation requests [<a href="#ref-Parisis13">Parisis13</a>]. All
machines run Blackadder (see <a href="#section-4.1">Section 4.1</a>). New nodes can join, and
experiments can be run on request.
<span class="h4"><a class="selflink" id="section-4.3.3" href="#section-4.3.3">4.3.3</a>. CUTEi: Container-Based ICN Testbed</span>
NICT has also developed a testbed used for ICN experiments [<a href="#ref-Asaeda14" title=""Container-Based Unified Testbed for Information-Centric Networking"">Asaeda14</a>]
comprising multiple servers located in Asia and other locations.
Each testbed server (or virtual machine) utilizes a Linux kernel-
based container (LXC) for node virtualization. This testbed enables
users to run applications and protocols for ICN in two
experimentation modes using two different container designs:
1. application-level experimentation using a "common container"
and
2. network-level experimentation using a "user container."
A common container is shared by all testbed users, and a user
container is assigned to one testbed user. A common container has a
global IP address to connect with other containers or external
networks, whereas each user container uses a private IP address and a
user space providing a closed networking environment. A user can
login to his/her user containers using SSH with his/her certificate,
or access them from PCs connected to the Internet using SSH
tunneling.
This testbed also implements an "on-filesystem cache" to allocate
caching data on a UNIX filesystem. The on-filesystem cache system
accommodates two kinds of caches: "individual cache" and "shared
cache." Individual cache is accessible for one dedicated router for
the individual user, while shared cache is accessible for a set of
routers in the same group to avoid duplicated caching in the
neighborhood for cooperative caching.
<span class="h2"><a class="selflink" id="section-5" href="#section-5">5</a>. Security Considerations</span>
This document does not impact the security of the Internet, but
<a href="#section-3">Section 3</a> outlines security and privacy concerns that might affect a
deployment of a future ICN approach.
<span class="grey">Pentikousis, et al. Informational [Page 25]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-26" ></span>
<span class="grey"><a href="./rfc7945">RFC 7945</a> ICN Evaluation and Security September 2016</span>
<span class="h2"><a class="selflink" id="section-6" href="#section-6">6</a>. Informative References</span>
[<a id="ref-4WARD6.1">4WARD6.1</a>] Ohlman, B., et al., "First NetInf Architecture
Description", 4WARD Project Deliverable D-6.1, April 2009.
[<a id="ref-4WARD6.3">4WARD6.3</a>] Ahlgren, B., et al., "NetInf Evaluation", 4WARD Project
Deliverable D-6.3, June 2010.
[<a id="ref-Arlitt97">Arlitt97</a>] Arlitt, M. and C. Williamson, "Internet web servers:
workload characterization and performance implications",
IEEE/ACM Transactions on Networking, vol. 5, pp. 631-645,
DOI 10.1109/90.649565, 1997.
[<a id="ref-Asaeda14">Asaeda14</a>] Asaeda, H., Li, R., and N. Choi, "Container-Based Unified
Testbed for Information-Centric Networking", IEEE Network,
vol. 28, no. 6, pp. 60-66, DOI 10.1109/MNET.2014.6963806,
2014.
[<a id="ref-Awiphan13">Awiphan13</a>]
Awiphan, S., et al., "Video streaming over content centric
networking: Experimental studies on PlanetLab", Proc.
Computing, Communications and IT Applications Conference
(ComComAp), IEEE, DOI 10.1109/ComComAp.2013.6533602, 2013.
[<a id="ref-Baccelli14">Baccelli14</a>]
Baccelli, E., et al., "Information Centric Networking in
the IoT: Experiments with NDN in the Wild", Proceedings of
the 1st international conference on Information-centric
networking (ICN '14), ACM, DOI 10.1145/2660129.2660144,
2014.
[<a id="ref-Barabasi99">Barabasi99</a>]
Barabasi, A. and R. Albert, "Emergence of Scaling in
Random Networks", Science, vol. 286, no. 5439, pp.
509-512, DOI 10.1126/science.286.5439.509, 1999.
[<a id="ref-Barford98">Barford98</a>]
Barford, P. and M. Crovella, "Generating representative
web workloads for network and server performance
evaluation", in ACM SIGMETRICS '98 / PERFORMANCE '98, pp.
151-160, DOI 10.1145/277851.277897, 1998.
[<a id="ref-Barford99">Barford99</a>]
Barford, P., Bestavros, A., Bradley, A., and M. Crovella,
"Changes in web client access patterns: Characteristics
and caching implications", World Wide Web, vol. 2, pp.
15-28, DOI 10.1023/A:1019236319752, 1999.
<span class="grey">Pentikousis, et al. Informational [Page 26]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-27" ></span>
<span class="grey"><a href="./rfc7945">RFC 7945</a> ICN Evaluation and Security September 2016</span>
[<a id="ref-Bellissimo04">Bellissimo04</a>]
Bellissimo, A., Levine, B., and P. Shenoy, "Exploring the
Use of BitTorrent as the Basis for a Large Trace
Repository", University of Massachusetts Amherst, Tech.
Rep. 04-41, 2004.
[<a id="ref-Bernardini14">Bernardini14</a>]
Bernardini, C., et al., "Socially-aware caching strategy
for content centric networking", Proc. IFIP Networking
Conference, DOI 10.1109/IFIPNetworking.2014.6857093, 2014.
[<a id="ref-Blefari-Melazzi12">Blefari-Melazzi12</a>]
Blefari Melazzi, N., et al., "Scalability Measurements in
an Information-Centric Network", Springer Lecture Notes in
Computer Science (LNCS), vol. 7586,
DOI 10.1007/978-3-642-41296-7_6, 2012.
[<a id="ref-Breslau99">Breslau99</a>]
Breslau, L., Cao, P., Fan, L., Phillips, G., and S.
Shenker, "Web caching and zipf-like distributions:
evidence and implications", Proc. of INFOCOM '99, New York
(NY), USA, DOI 10.1109/INFCOM.1999.749260, March 1999.
[<a id="ref-Busari02">Busari02</a>] Busari, M. and C. Williamson, "ProWGen: a synthetic
workload generation tool for simulation evaluation of web
proxy caches", Computer Networks, vol. 38, no. 6, pp.
779-794, DOI 10.1016/S1389-1286(01)00285-7, 2002.
[<a id="ref-Carofiglio11">Carofiglio11</a>]
Carofiglio, G., Gallo, M., Muscariello, L., and D. Perino,
"Modeling Data Transfer in Content-Centric Networking",
Proceedings of the 23rd International Teletraffic Congress
(ITC '11), San Francisco, USA, September 2011.
[<a id="ref-Carofiglio13">Carofiglio13</a>]
Carofiglio, G., et al., "Optimal multipath congestion
control and request forwarding in Information-Centric
Networks", Proc. 2013 21st IEEE International Conference
on Network Protocols (ICNP),
DOI 10.1109/ICNP.2013.6733576, 2013.
[<a id="ref-CCNPL">CCNPL</a>] Institut de Recherche Technologique (IRT) SystemX, "CCNPL-
SIM", <<a href="http://systemx.enst.fr/ccnpl-sim">http://systemx.enst.fr/ccnpl-sim</a>>.
[<a id="ref-ccnSim">ccnSim</a>] Rossini, G. and D. Rossi, "Large scale simulation of CCN
networks", Proc. AlgoTel 2012, La Grande Motte, France,
May 2012.
<span class="grey">Pentikousis, et al. Informational [Page 27]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-28" ></span>
<span class="grey"><a href="./rfc7945">RFC 7945</a> ICN Evaluation and Security September 2016</span>
[<a id="ref-Cha07">Cha07</a>] Cha, M., Kwak, H., Rodriguez, P., Ahn, Y.-Y., and S. Moon,
"I tube, you tube, everybody tubes: analyzing the world's
largest user generated content video system", Proceedings
of the 7th ACM SIGCOMM conference on Internet measurement
(IMC '07), San Diego (CA), USA,
DOI 10.1145/1298306.1298309, October 2007.
[<a id="ref-Chaabane13">Chaabane13</a>]
Chaabane, A., De Cristofaro, E., Kaafar, M., and E. Uzun,
"Privacy in Content-Oriented Networking: Threats and
Countermeasures", ACM SIGCOMM Computer Communication
Review, Vol. 43, Issue 3, DOI 10.1145/2500098.2500102,
July 2013.
[<a id="ref-Cheng08">Cheng08</a>] Cheng, X., Dale, C., and J. Liu, "Statistics and social
network of YouTube videos", 16th International Workshop on
Quality of Service (IWQoS 2008), IEEE, pp. 229-238,
DOI 10.1109/IWQOS.2008.32, 2008.
[<a id="ref-Cheng13">Cheng13</a>] Cheng, X., Liu, J., and C. Dale, "Understanding the
Characteristics of Internet Short Video Sharing: YouTube
as a Case Study", IEEE Transactions on Multimedia, vol.
15, issue 5, DOI 10.1109/TMM.2013.2265531, 2013.
[<a id="ref-Chai12">Chai12</a>] Chai, W., He, D., Psaras, I., and G. Pavlou, "Cache 'Less
for More' in Information-centric Networks", Proceedings of
the 11th international IFIP TC 6 conference on Networking
(IFIP '12), DOI 10.1007/978-3-642-30045-5_3, 2012.
[<a id="ref-Cianci12">Cianci12</a>] Cianci, I. et al. "CCN - Java Opensource Kit EmulatoR for
Wireless Ad Hoc Networks", Proc. of the 7th International
Conference on Future Internet Technologies (CFI '12),
Seoul, Korea, DOI 10.1145/2377310.2377313, September 2012.
[<a id="ref-CMT-D5.2">CMT-D5.2</a>] Beben, A., et al., "Scalability of COMET System", COMET
Project Deliverable D5.2, February 2013.
[<a id="ref-CMT-D6.2">CMT-D6.2</a>] Georgiades, M., et al., "Prototype Experimentation and
Demonstration", COMET Project Deliverable D6.2, February
2013.
[<a id="ref-Dannewitz10">Dannewitz10</a>]
Dannewitz, C., Golic, J., Ohlman, B., B. Ahlgren, "Secure
Naming for A Network of Information", IEEE Conference on
Computer Communications Workshops (INFOCOM), San Diego,
CA, DOI 10.1109/INFCOMW.2010.5466661, March 2010.
<span class="grey">Pentikousis, et al. Informational [Page 28]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-29" ></span>
<span class="grey"><a href="./rfc7945">RFC 7945</a> ICN Evaluation and Security September 2016</span>
[<a id="ref-DETERLAB">DETERLAB</a>] Benzel, T., "The Science of Cyber-Security
Experimentation: The DETER Project", Proceedings of the
27th Annual Computer Security Applications Conference
(ACSAC '11), DOI 10.1145/2076732.2076752, December 2011.
[<a id="ref-Dimitropoulos09">Dimitropoulos09</a>]
Dimitropoulos, X., et al., "Graph annotations in modeling
complex network topologies", ACM Transactions on Modeling
and Computer Simulation (TOMACS), vol. 19, no. 4,
DOI 10.1145/1596519.1596522, November 2009.
[<a id="ref-DONA">DONA</a>] Koponen, T., et al., "A Data-Oriented (and Beyond) Network
Architecture", Proceedings of the 2007 conference on
Applications, technologies, architectures, and protocols
for computer communications (SIGCOMM '07), ACM,
DOI 10.1145/1282380.1282402, 2007.
[<a id="ref-EMULAB">EMULAB</a>] Eide, E., et al., "An Experimentation Workbench for
Replayable Networking Research", Proceedings of the 4th
USENIX conference on Networked systems design &
implementation (NSDI '07), 2007.
[<a id="ref-Fotiou12">Fotiou12</a>] Fotiou, N., et al., "Access control enforcement delegation
for information-centric networking architectures",
Proceedings of the second edition of the ICN workshop on
Information-centric networking (ICN '12), ACM,
DOI 10.1145/2342488.2342507, 2012.
[<a id="ref-Fotiou14">Fotiou14</a>] Fotiou, N., et al., "A framework for privacy analysis of
ICN architectures", Proc. Second Annual Privacy Forum
(APF), Springer, DOI 10.1007/978-3-319-06749-0_8, 2014.
[<a id="ref-Fri12">Fri12</a>] Fricker, C., Robert, P., Roberts, J. and N. Sbihi,
"Impact of traffic mix on caching performance in a
content-centric network", 2012 IEEE Conference on Computer
Communications Workshops (INFOCOM WKSHPS), Orlando, USA,
DOI 10.1109/INFCOMW.2012.6193511, March 2012.
[<a id="ref-Goog08">Goog08</a>] Google, "Official Google Blog: We knew the web was
big...", July 2008, <<a href="http://googleblog.blogspot.it/2008/07/we-knew-web-was-big.html">http://googleblog.blogspot.it/</a>
<a href="http://googleblog.blogspot.it/2008/07/we-knew-web-was-big.html">2008/07/we-knew-web-was-big.html</a>>.
[<a id="ref-Guo07">Guo07</a>] Guo, L., Chen, S., Xiao, Z., Tan, E., Ding, X., and X.
Zhang, "A performance study of BitTorrent-like peer-to-
peer systems", IEEE Journal on Selected Areas in
Communication, vol. 25, no. 1, pp. 155-169,
DOI 10.1109/JSAC.2007.070116, 2007.
<span class="grey">Pentikousis, et al. Informational [Page 29]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-30" ></span>
<span class="grey"><a href="./rfc7945">RFC 7945</a> ICN Evaluation and Security September 2016</span>
[<a id="ref-HASHROUT">HASHROUT</a>] Saino, L., Psaras, I., and G. Pavlou, "Hash-routing
Schemes for Information-Centric Networking", Proceedings
of the 3rd ACM SIGCOMM workshop on Information-centric
networking (ICN '13), DOI 10.1145/2491224.2491232, 2013.
[<a id="ref-Hefeeda08">Hefeeda08</a>]
Hefeeda, M. and O. Saleh, "Traffic Modeling and
Proportional Partial Caching for Peer-to-Peer Systems",
IEEE/ACM Transactions on Networking, vol. 16, no. 6, pp.
1447-1460, DOI 10.1109/TNET.2008.918081, 2008.
[<a id="ref-ICARUS">ICARUS</a>] Saino, L., Psaras, I., and G. Pavlou, "Icarus: a Caching
Simulator for Information Centric Networking (ICN)",
Proceedings of the 7th International ICST Conference on
Simulation Tools and Techniques (SimuTools '14),
DOI 10.4108/icst.simutools.2014.254630, 2014.
[<a id="ref-Detti12">Detti12</a>] Detti, A., et al., "Supporting the Web with an Information
Centric Network that Routes by Name", Elsevier Computer
Networks, vol. 56, no. 17,
DOI 10.1016/j.comnet.2012.08.006, November 2012.
[<a id="ref-ICNSIMS">ICNSIMS</a>] Tortelli, M., et al., "CCN Simulators: Analysis and Cross-
Comparison", Proceedings of the 1st international
conference on Information-centric networking (ICN '14),
ACM, DOI 10.1145/2660129.2660133, 2014.
[<a id="ref-IMB2014">IMB2014</a>] Imbrenda, C., Muscariello, L., and D. Rossi, "Analyzing
Cacheable Traffic in ISP Access Networks for Micro CDN
Applications via Content-Centric Networking", Proceedings
of the 1st international conference on Information-centric
networking (ICN '14), DOI 10.1145/2660129.2660146, 2014.
[<a id="ref-Ion13">Ion13</a>] Ion, M., Zhang, J., and E. Schooler, "Toward content-
centric privacy in ICN: attribute-based encryption and
routing", Proceedings of the ACM SIGCOMM 2013 conference
on SIGCOMM (SIGCOMM '13), ACM,
DOI 10.1145/2486001.2491717, 2013.
[<a id="ref-Jacobson09">Jacobson09</a>]
Jacobson, V., et al., "Networking Named Content",
Proceedings of the 5th international conference on
Emerging networking experiments and technologies (CoNEXT
'09), DOI 10.1145/1658939.1658941, 2009.
<span class="grey">Pentikousis, et al. Informational [Page 30]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-31" ></span>
<span class="grey"><a href="./rfc7945">RFC 7945</a> ICN Evaluation and Security September 2016</span>
[<a id="ref-Katsaros12">Katsaros12</a>]
Katsaros, K., Xylomenos, G., and G. Polyzos, "GlobeTraff:
a traffic workload generator for the performance
evaluation of future Internet architectures", 2012 5th
International Conference on New Technologies, Mobility and
Security (NTMS), DOI 10.1109/NTMS.2012.6208742, 2012.
[<a id="ref-Katsaros15">Katsaros15</a>]
Katsaros, K., et al., "On the Inter-domain Scalability of
Route-by-Name Information-Centric Network Architectures",
Proc. IFIP Networking Conference,
DOI 10.1109/IFIPNetworking.2015.7145308, 2015.
[<a id="ref-Kaune09">Kaune09</a>] Kaune, S. et al., "Modelling the Internet Delay Space
Based on Geographical Locations", 17th Euromicro
International Conference on Parallel, Distributed and
Network-based Processing, Weimar, Germany,
DOI 10.1109/PDP.2009.44, 2009.
[<a id="ref-Labovitz10">Labovitz10</a>]
Labovitz, C., Iekel-Johnson, S., McPherson, D., Oberheide,
J., and F. Jahanian, "Internet inter-domain traffic", In
Proceedings of the ACM SIGCOMM 2010 conference (SIGCOMM
DOI 10.1145/1851182.1851194, 2010.
[<a id="ref-Lauinger10">Lauinger10</a>]
Lauinger, T., "Security and Scalability of Content-Centric
Networking", Masters Thesis, Technische Universitaet
Darmstadt and Eurecom, September 2010.
[<a id="ref-Lauinger12">Lauinger12</a>]
Lauinger, Y., et al, "Privacy Risks in Named Data
Networking: What is the Cost of Performance?", ACM SIGCOMM
Computer Communication Review, Vol. 42, Issue 5,
DOI 10.1145/2378956.2378966, 2012.
[<a id="ref-Led12">Led12</a>] Lederer, S., Muller, C., and C. Timmerer, "Dynamic
adaptive streaming over HTTP dataset", Proceedings of the
ACM Multimedia Systems Conference (MMSys '12), pp. 89-94,
DOI 10.1145/2155555.2155570, 2012.
[<a id="ref-Lewko11">Lewko11</a>] Lewko, A. and B. Waters, "Decentralizing attribute-based
encryption", Proc. of EUROCRYPT 2011, Lecture Notes in
Computer Science (LNCS), vol. 6632, pp. 568-588,
DOI 10.1007/978-3-642-20465-4_31, 2011.
<span class="grey">Pentikousis, et al. Informational [Page 31]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-32" ></span>
<span class="grey"><a href="./rfc7945">RFC 7945</a> ICN Evaluation and Security September 2016</span>
[<a id="ref-LIRA">LIRA</a>] Psaras, I., Katsaros, K., Saino, L., and G. Pavlou, "Lira:
A location independent routing layer based on source-
provided ephemeral names", Electronic and Electrical Eng.
Dept., UCL, London, UK, Tech. Rep. 2014,
<<a href="http://www.ee.ucl.ac.uk/comit-project/publications.html">http://www.ee.ucl.ac.uk/comit-project/publications.html</a>>.
[<a id="ref-Mahanti00">Mahanti00</a>]
Mahanti, A., Williamson, C., and D. Eager., "Traffic
analysis of a web proxy caching hierarchy", IEEE Network,
Vol. 14, No. 3, pp. 16-23, DOI 10.1109/65.844496, May/June
2000.
[<a id="ref-Maier09">Maier09</a>] Maier, G., Feldmann, A., Paxson, V., and M. Allman, "On
dominant characteristics of residential broadband internet
traffic", In Proceedings of the 9th ACM SIGCOMM conference
on Internet measurement conference (IMC '09), New York,
NY, USA, 90-102. DOI 10.1145/1644893.1644904, 2009.
[<a id="ref-Marciniak08">Marciniak08</a>]
Marciniak, P., Liogkas, N., Legout, A., and E. Kohler,
"Small is not always beautiful", In Proc. of IPTPS,
International Workshop of Peer-to-Peer Systems, Tampa Bay,
Florida (FL), USA, February 2008.
[<a id="ref-MiniCCNx">MiniCCNx</a>] Cabral, C., et al., "High fidelity content-centric
experiments with Mini-CCNx", 2014 IEEE Symposium on
Computers and Communications (ISCC),
DOI 10.1109/ISCC.2014.6912537, 2014.
[<a id="ref-Montage">Montage</a>] Hussain, A. and J. Chen, "Montage Topology Manager: Tools
for Constructing and Sharing Representative Internet
Topologies", DETER Technical Report, ISI-TR-684, August
2012.
[<a id="ref-Muscariello11">Muscariello11</a>]
Muscariello, L., Carofiglio, G., and M. Gallo, "Bandwidth
and storage sharing performance in information centric
networking", Proceedings of the ACM SIGCOMM workshop on
Information-centric networking (ICN '11),
DOI 10.1145/2018584.2018593, 2011.
[<a id="ref-ndnSIM">ndnSIM</a>] Afanasyev, A., et al., "ndnSIM: NDN simulator for NS-3",
NDN Technical Report NDN-0005, Revision 2, October 2012.
[<a id="ref-ndnSIM2">ndnSIM2</a>] Mastorakis, S., et al., "ndnSIM 2.0: A new version of the
NDN simulator for NS-3", NDN Technical Report NDN-0028,
Revision 1, January 2015.
<span class="grey">Pentikousis, et al. Informational [Page 32]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-33" ></span>
<span class="grey"><a href="./rfc7945">RFC 7945</a> ICN Evaluation and Security September 2016</span>
[<a id="ref-NEPI">NEPI</a>] Quereilhac, A., et al., "NEPI: An integration framework
for Network Experimentation", 2011 19th International
Conference on Software, Telecommunications and Computer
Networks (SoftCOM), IEEE, 2011.
[<a id="ref-OFELIA">OFELIA</a>] Sune, M., et al., "Design and implementation of the OFELIA
FP7 facility: The European OpenFlow testbed", Computer
Networks, vol. 61, pp. 132-150,
DOI 10.1016/j.bjp.2013.10.015, March 2014.
[<a id="ref-ONL">ONL</a>] DeHart, J., et al., "The open network laboratory: a
resource for networking research and education", ACM
SIGCOMM Computer Communication Review (CCR), vol. 35, no.
5, pp. 75-78, DOI 10.1145/1096536.1096547, 2005.
[<a id="ref-Parisis13">Parisis13</a>]
Parisis, G., Trossen, D., and H. Asaeda, "A Node Design
and a Framework for Development and Experimentation for an
Information-Centric Network", IEICE Transactions on
Communications, vol. E96-B, no. 7, pp. 1650-1660, July
2013.
[<a id="ref-Perino11">Perino11</a>] Perino, D. and M. Varvello, "A Reality Check for Content
Centric Networking", Proceedings of the ACM SIGCOMM
workshop on Information-centric networking (ICN '11),
DOI 10.1145/2018584.2018596, 2011.
[<a id="ref-PLANETLAB">PLANETLAB</a>]
Chun, B., et al., "Planetlab: an overlay testbed for
broad-coverage services", ACM SIGCOMM Computer
Communication Review (CCR), vol. 33, no. 3, pp. 3-12,
DOI 10.1145/956993.956995, 2003.
[<a id="ref-PRST4.5">PRST4.5</a>] Riihijarvi, J., et al., "Final Architecture Validation and
Performance Evaluation Report", PURSUIT Project
Deliverable D4.5, January 2013.
[<a id="ref-Psaras11">Psaras11</a>] Psaras, I., Clegg, R., Landa, R., Chai, W., Pavlou, G.,
"Modelling and Evaluation of CCN-Caching Trees",
Proceedings of the 10th international IFIP TC 6 conference
on Networking, Valencia, Spain, May 2011.
[<a id="ref-Psaras12">Psaras12</a>] Psaras, I., Chai, W., and G. Pavlou, "Probabilistic In-
Network Caching for Information-Centric Networks",
Proceedings of the second edition of the ICN workshop on
Information-centric networking (ICN '12),
DOI 10.1145/2342488.2342501, 2012.
<span class="grey">Pentikousis, et al. Informational [Page 33]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-34" ></span>
<span class="grey"><a href="./rfc7945">RFC 7945</a> ICN Evaluation and Security September 2016</span>
[<a id="ref-Quereilhac14">Quereilhac14</a>]
Quereilhac, A., et al., "Demonstrating a unified ICN
development and evaluation framework", Proceedings of the
1st international conference on Information-centric
networking (ICN '14), ACM, DOI 10.1145/2660129.2660132,
2014.
[<a id="ref-Renault09">Renault09</a>]
Renault, E., Ahmad, A., and M. Abid, "Toward a Security
Model for the Future Network of Information", Proceedings
of the 4th International Conference on Ubiquitous
Information Technologies & Applications (ICUT '09), IEEE,
DOI 10.1109/ICUT.2009.5405676, 2009.
[<a id="ref-RFC2330">RFC2330</a>] Paxson, V., Almes, G., Mahdavi, J., and M. Mathis,
"Framework for IP Performance Metrics", <a href="./rfc2330">RFC 2330</a>,
DOI 10.17487/RFC2330, May 1998,
<<a href="http://www.rfc-editor.org/info/rfc2330">http://www.rfc-editor.org/info/rfc2330</a>>.
[<a id="ref-RFC5743">RFC5743</a>] Falk, A., "Definition of an Internet Research Task Force
(IRTF) Document Stream", <a href="./rfc5743">RFC 5743</a>, DOI 10.17487/RFC5743,
December 2009, <<a href="http://www.rfc-editor.org/info/rfc5743">http://www.rfc-editor.org/info/rfc5743</a>>.
[<a id="ref-RFC6920">RFC6920</a>] Farrell, S., Kutscher, D., Dannewitz, C., Ohlman, B.,
Keranen, A., and P. Hallam-Baker, "Naming Things with
Hashes", <a href="./rfc6920">RFC 6920</a>, DOI 10.17487/RFC6920, April 2013,
<<a href="http://www.rfc-editor.org/info/rfc6920">http://www.rfc-editor.org/info/rfc6920</a>>.
[<a id="ref-RFC7476">RFC7476</a>] Pentikousis, K., Ed., Ohlman, B., Corujo, D., Boggia, G.,
Tyson, G., Davies, E., Molinaro, A., and S. Eum,
"Information-Centric Networking: Baseline Scenarios",
<a href="./rfc7476">RFC 7476</a>, DOI 10.17487/RFC7476, March 2015,
<<a href="http://www.rfc-editor.org/info/rfc7476">http://www.rfc-editor.org/info/rfc7476</a>>.
[<a id="ref-RFC7927">RFC7927</a>] Kutscher, D., Ed., Eum, S., Pentikousis, K., Psaras, I.,
Corujo, D., Saucez, D., Schmidt, T., and M. Waehlisch,
"Information-Centric Networking (ICN) Research
Challenges", <a href="./rfc7927">RFC 7927</a>, DOI 10.17487/RFC7927, July 2016,
<<a href="http://www.rfc-editor.org/info/rfc7927">http://www.rfc-editor.org/info/rfc7927</a>>.
[<a id="ref-RFC7933">RFC7933</a>] Westphal, C., Ed., Lederer, S., Posch, D., Timmerer, C.,
Azgin, A., Liu, W., Mueller, C., Detti, A., Corujo, D.,
Wang, J., Montpetit, M., and N. Murray, "Adaptive Video
Streaming over Information-Centric Networking (ICN)",
<a href="./rfc7933">RFC 7933</a>, DOI 10.17487/RFC7933, August 2016,
<<a href="http://www.rfc-editor.org/info/rfc7933">http://www.rfc-editor.org/info/rfc7933</a>>.
<span class="grey">Pentikousis, et al. Informational [Page 34]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-35" ></span>
<span class="grey"><a href="./rfc7945">RFC 7945</a> ICN Evaluation and Security September 2016</span>
[<a id="ref-SAIL-B2">SAIL-B2</a>] SAIL, "NetInf Content Delivery and Operations", SAIL
Project Deliverable D-B.2, May 2012.
[<a id="ref-SAIL-B3">SAIL-B3</a>] Kutscher, D., Ed., et al., "Final NetInf Architecture",
SAIL Project Deliverable D-B.3, January 2013,
<<a href="http://www.sail-project.eu/deliverables/">http://www.sail-project.eu/deliverables/</a>>.
[<a id="ref-Saino13">Saino13</a>] Saino, L., Cocora, C., and G. Pavlou, "A Toolchain for
Simplifying Network Simulation Setup", Proceedings of the
6th International ICST Conference on Simulation Tools and
Techniques (SimuTools '13), 2013.
[<a id="ref-Saleh06">Saleh06</a>] Saleh, O., and M. Hefeeda, "Modeling and caching of peer-
to-peer traffic", Proceedings of the 2006 IEEE
International Conference on Network Protocols (ICNP),
DOI 10.1109/ICNP.2006.320218, 2006.
[<a id="ref-Salsano12">Salsano12</a>]
Salsano, S., et al., "Transport-Layer Issues in
Information Centric Networks", Proceedings of the second
edition of the ICN workshop on Information-centric
networking (ICN '12), ACM, DOI 10.1145/2342488.2342493,
2012.
[<a id="ref-Salsano13">Salsano13</a>]
Salsano, S., et al., "Information Centric Networking over
SDN and OpenFlow: Architectural Aspects and Experiments on
the OFELIA Testbed", Computer Networks, vol. 57, no. 16,
pp. 3207-3221, DOI 10.1016/j.comnet.2013.07.031, November
2013.
[<a id="ref-SensReqs">SensReqs</a>] Karnouskos, S., et al., "Requirement considerations for
ubiquitous integration of cooperating objects", 2011 4th
IFIP International Conference on New Technologies,
Mobility and Security (NTMS),
DOI 10.1109/NTMS.2011.5720605, 2011.
[<a id="ref-Smetters09">Smetters09</a>]
Smetters, D., and V. Jacobson, "Securing network content",
Technical Report TR-2009-01, PARC, 2009.
[<a id="ref-Sourlas15">Sourlas15</a>]
Sourlas, V., Tassiulas, L., Psaras, I., and G. Pavlou,
"Information Resilience through User-Assisted Caching in
Disruptive Content-Centric Networks", 14th IFIP Networking
Conference, Toulouse, France,
DOI 10.1109/IFIPNetworking.2015.7145301, May 2015.
<span class="grey">Pentikousis, et al. Informational [Page 35]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-36" ></span>
<span class="grey"><a href="./rfc7945">RFC 7945</a> ICN Evaluation and Security September 2016</span>
[<a id="ref-Tagger12">Tagger12</a>] Tagger, B., et al., "Update on the Architecture and Report
on Security Analysis", Deliverable 2.4, PURSUIT EU FP7
project, April 2012.
[<a id="ref-Tourani16">Tourani16</a>]
Tourani, R., Mick, T., Misra, S., and G. Panwar,
"Security, Privacy, and Access Control in Information-
Centric Networking: A Survey", arXiv:1603.03409, March
2016.
[<a id="ref-VoCCN">VoCCN</a>] Jacobson, V., et al., "VoCCN: Voice-over Content-Centric
Networks", Proceedings of the 2009 workshop on Re-
architecting the internet (ReArch '09),
DOI 10.1145/1658978.1658980, 2009.
[<a id="ref-Watts98">Watts98</a>] Watts, D. J. and S. H. Strogatz, "Collective dynamics of
'small-world' networks", Nature, vol. 393, no. 6684, pp.
440-442, DOI 10.1038/30918, April 1998.
[<a id="ref-Yu06">Yu06</a>] Yu, H., Zheng, D., Zhao, B., and W. Zheng, "Understanding
user behavior in large-scale video-on-demand systems", ACM
SIGOPS Operating Systems Review - Proceedings of the 2006
EuroSys conference, Vol. 40, Issue 4, pp. 333-344,
DOI 10.1145/1218063.1217968, April 2006.
[<a id="ref-Zhang10a">Zhang10a</a>] Zhang, C., Dhungel, P., Wu, D., and K. Ross, "Unraveling
the BitTorrent Ecosystem", IEEE Transactions on Parallel
and Distributed Systems, vol. 22, issue 7, pp. 1164-1177,
DOI 10.1109/TPDS.2010.123, 2010.
[<a id="ref-Zhang10b">Zhang10b</a>] Zhang, L., et al., "Named Data Networking (NDN) Project",
NDN Technical Report NDN-0001, October 2010,
<<a href="http://named-data.net/publications/techreports/">http://named-data.net/publications/techreports/</a>>.
[<a id="ref-Zhou11">Zhou11</a>] Zhou, J., Li, Y., Adhikari, K., and Z.-L. Zhang,
"Counting YouTube videos via random prefix sampling",
Proceedings of the 2011 ACM SIGCOMM conference on Internet
measurement conference (IMC '11), Berlin, Germany,
DOI 10.1145/2068816.2068851, November 2011.
<span class="grey">Pentikousis, et al. Informational [Page 36]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-37" ></span>
<span class="grey"><a href="./rfc7945">RFC 7945</a> ICN Evaluation and Security September 2016</span>
Acknowledgments
Konstantinos Katsaros contributed the updated text of <a href="#section-2.2">Section 2.2</a>
along with an extensive set of references.
Priya Mahadevan, Daniel Corujo, and Gareth Tyson contributed to a
draft version of this document.
This document has benefited from reviews, pointers to the growing ICN
literature, suggestions, comments, and proposed text provided by the
following members of the IRTF Information-Centric Networking Research
Group (ICNRG), listed in alphabetical order: Marica Amadeo, Hitoshi
Asaeda, E. Baccelli, Claudia Campolo, Christian Esteve Rothenberg,
Suyong Eum, Nikos Fotiou, Dorothy Gellert, Luigi Alfredo Grieco,
Myeong-Wuk Jang, Ren Jing, Will Liu, Antonella Molinaro, Luca
Muscariello, Ioannis Psaras, Dario Rossi, Stefano Salsano, Damien
Saucez, Dirk Trossen, Jianping Wang, Yuanzhe Xuan, and Xinwen Zhang.
The IRSG review was provided by Aaron Falk.
<span class="grey">Pentikousis, et al. Informational [Page 37]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-38" ></span>
<span class="grey"><a href="./rfc7945">RFC 7945</a> ICN Evaluation and Security September 2016</span>
Authors' Addresses
Kostas Pentikousis (editor)
Travelping
Koernerstr. 7-10
10785 Berlin
Germany
Email: k.pentikousis@travelping.com
Borje Ohlman
Ericsson Research
S-16480 Stockholm
Sweden
Email: Borje.Ohlman@ericsson.com
Elwyn Davies
Trinity College Dublin/Folly Consulting Ltd
Dublin, 2
Ireland
Email: davieseb@scss.tcd.ie
Spiros Spirou
Intracom Telecom
19.7 km Markopoulou Avenue
19002 Peania, Athens
Greece
Email: spis@intracom-telecom.com
Gennaro Boggia
Dept. of Electrical and Information Engineering
Politecnico di Bari
Via Orabona 4
70125 Bari
Italy
Email: g.boggia@poliba.it
Pentikousis, et al. Informational [Page 38]
</pre>
|