ACM ICN 2022, Osaka, Japan
MENU

9th ACM Conference on Information-Centric Networking (ICN 2022), Sept. 19–21, 2022

Conference Program

The conference consists of the in-person program at Japan time (JST) and the remote program at EU/US time.
  • In-person program: The in-person program starts at 8:00 JST and the sessions are distributed to remote participants via WebEX.
  • Remote program: The remote program starts at 13:00 UTC/15:00 CEST/9:00 EDT/6:00 PDT. The recorded videos of the in-person program are streamed in realtime via WebEX. Each technical session is followed by a 15 minute live Q&A session.
Kindly note that the schedule below is tentative and subject to updates.

In-person Program

Schedule at a Glance

Conference Schedule at a Glance

Schedule

  • Monday, September 19, 2022

  • 8:00 - 11:00 JST: Tutorials

  • 8:00 - 11:00 JST Tutorial1: Evaluating NDN using ndnSIM and Mini-NDN

  • 8:00 - 11:00 JST Tutorial2: CCNx-based Cloud-Native Function Networking and Applications

  • 11:00 - 12:30 JST: Lunch Break

  • 12:30 - 17:15 JST: Tutorials

  • 12:30 - 15:00 JST Tutorial1: Evaluating NDN using ndnSIM and Mini-NDN

  • 12:30 - 17:15 JST Tutorial3: Zenoh: Data-Centric Communication for the Cloud-to-Things Continuum

  • Tuesday, September 20, 2022

  • 8:00 - 8:15 JST: Opening

    Session Chair: General Chairs, PC Chairs, ...

  • 8:15 - 9:15 JST: Keynote

    Session Chair: Toru Hasegawa (Osaka University)

  • Keynote: Travels with ICN - The Road Traversed and the Road Ahead

    David R. Oran (Network Systems Research & Design)


    Abstract: In this talk I give a biased retrospective on ten years of ICN research, and some hopefully controversial thoughts on where we might go for the next ten.

     

    Bio: David Oran was until 2016 a Fellow at Cisco Systems. He is now independent and pursuing his research interests in a number of areas, including in-network computing and Information Centric Networking. He also has an appointment as a Research Affiliate at the MIT Media Laboratory. His recent work has been in congestion control for ICN and using ICN as a substrate for modern distributed computing languages. His long term technical interests lie in the areas of Quality of Service, Internet multimedia, routing, and security. He was part of the original team that started Cisco's Voice-over-IP business in 1996 and helped grow it into a multi-billion dollar revenue stream.
    Prior to joining Cisco, Mr. Oran worked in the network architecture group at Digital Equipment, where he designed routing algorithms and a distributed directory system. Mr. Oran has led a number of industry standards efforts. He was a member of the Internet Architecture Board, co-chair of the Speech Services working group, and served a term as area director for Routing in the IETF. He currently serves as co-Chair of the Information Centric Networking Research Group of the IRTF. He was on the board of the SIP Forum from its inception through 2008. He also serves on the technical advisory boards of a number of venture-backed firms in the networking and telecommunication sectors.
    Mr. Oran has a B.A. in English from Haverford College.

     

  • 9:15 - 9:30 JST: Short Break

  • 9:30 - 10:30 JST: Panel 1

    Session Chair: Thomas C. Schmidt (HAW Hamburg)

  • Panel: Hard Lessons for ICN from IP Multicast?


    Panelists:
    Jon Crowcroft (University of Cambridge, UK)
    Dave Oran (Network Systems Research & Design, US)
    George Xylomenos (Athens University of Economics and Business, GR)

     

  • Statement: Hard Lessons for ICN from IP multicast

    Jon Crowcroft (University of Cambridge)

    • Abstract:

      In this brief statement, we trace the line of thought from Internet Multicast through to Information Centric Networking, and use this to outline what we think should have been the priorities in ICN work from the start.

       

  • 10:30 - 11:00 JST: Break

  • 11:00 - 12:15 JST: Session 1: ICN Forwarding and Congestion Control

    Session Chair: Lixia Zhang (UCLA)

  • ZQTRTT: A Multipath Scheduler for Heterogeneous Traffic in ICNs Based on Zero Queueing Time Ratio

    Bengt Ahlgren (RISE), Karl-Johan Grinnemo (Karlstad University)

    • Abstract:

      Information-centric networks (ICNs) intrinsically support multipath transfer and thus have been seen as an exciting paradigm for IoT and edge computing, not least in the context of 5G mobile networks. One key to ICN's success in these and other networks that have to support a diverse set of services over a heterogeneous network infrastructure is to schedule traffic over the available network paths efficiently. This paper presents and evaluates ZQTRTT, a multipath scheduling scheme for ICN that load balances bulk traffic over available network paths and schedules latency-sensitive, non-bulk traffic to reduce its transfer delay. A new metric called zero queueing time (ZQT) ratio estimates path load and is used to compute forwarding fractions for load balancing. In particular, the paper shows through a simulation campaign that ZQTRTT can accommodate the demands of both latency-sensitive and -insensitive traffic as well as evenly distribute traffic over available network paths.

       

  • Effective NDN Congestion Control Based on Queue Size Feedback

    Sichen Song (UCLA), Lixia Zhang (UCLA)

    • Abstract:

      Named data networking (NDN) can improve the consumer data retrieval throughput with its built-in multicast data delivery, innetwork caching, and ability to support multi-path forwarding. However, their realization brings challenges. In this work, we first examine how multi-path forwarding and in-network caching can interfere with consumer measurements for congestion control. Based on the results, we propose a congestion control solution, NDN-QSF, that can work effectively in the presence of in-network caching. In NDN-QSF, forwarders estimate upstream bandwidth and use queue size as congestion feedback to inform downstream routers to limit interest transmission rates. We further adapt and extend NDN-QSF to enable routers to make informed multi-path forwarding decisions. We evaluated NDN-QSF through simulation experimentation and our results show that NDN-QSF can effectively control congestion by using queue size as congestion feedback and improve network throughput with multi-path forwarding.

       

  • OPSEL: Optimal Producer Selection under Data Redundancy in Wireless Edge Environments

    Mohammed Elbadry (Stony Brook University), Fan Ye (Stony Brook University), Peter Milder (Stony Brook University)

    • Abstract:

      In wireless edge environments, data redundancy among multiple neighboring nodes is common due to the need to support application performance, mitigate faults, or the intrinsic nature of applications (e.g., AR/VR, edge storage). Further, under data centric paradigms (e.g., Named Data Networking (NDN)), consumers that request the same data may leverage multicast so data are sent only once (e.g., VR games with data cached at multiple edge nodes). Naive strategies such as selecting a random neighbor or the prevailing wisdom of choosing the one with the strongest received signal strength (RSSI) cause more severe loss than other available producers. In this paper, we propose OPSEL, a single-hop dynamic producer(s) selection protocol that enables single and multiple consumers to continuously identify the optimal producer(s) (e.g., lowest loss) under constantly varying medium conditions. When Data is available single-hop, OPSEL's goal is to have the minimum number of producers sending to all consumers and meeting their performance needs without explicit coordination messages. Experiments on a real prototype show that OPSEL is 3% away in loss rate and has the same latency as the theoretical ideal, while naive timer methods can incur up to 60% more loss and 2-3× latency.

       

  • 12:15 - 13:45 JST: Lunch Break

  • 13:45 - 15:15 JST: Poster/Demo

    Session Chair: Kazuhisa Matsuzono (NICT)

  • Adaptive Duplicate Suppression for Multicasting in Multi-Access NDN Network

    Saurab Dulal (The University of Memphis), Lan wang (University of Memphis)

    • Abstract:

      This poster presents our ongoing work on adaptive duplicate suppression for multicasting in a multi-access NDN network. It includes our design, implementation, and some preliminary evaluation results. Our early evaluation shows a substantial reduction in duplicate traffic in NDN multicast communication.

       

  • Information-Centric Service Mesh for Autonomous In-network Computing

    Kenji Kanai (Waseda University), Toshitaka Tsuda (Waseda University), Hidenori Nakazato (Waseda University), Jiro Katto (Waseda University)

    • Abstract:

      In this paper, we introduce an information-centric service mesh for autonomous in-network computing. The information-centric service mesh offers service-centric networking, not connectivity-based networking provided by the current container orchestration, like Kubernetes (K8s). We implement the information-centric service mesh by adopting an ambassador container style and using Cefore and Cefpyco which is the CCNx software implementation developed by NICT in Japan. For the proof-of-concept test, we demonstrate the end-to-end delay of more complex service chain models (up to 17 nodes) on our K8s cluster.

       

  • Popularity-Aware Dynamic Clustering Scheme for Distributed Caching in ICN

    Mikiya Yoshida (University of Kitakyushu), Yusuke Ito (University of Kitakyushu), Yurino Sato (National Institute of Technology), Hiroyuki Koga (University of Kitakyushu)

    • Abstract:

      To realize low-latency content delivery in Information-Centric Networking, a scheme to cluster domains and retain popular content in each cluster has been proposed, which enables consumers to retrieve content from nearby clusters. However, when the distribution of content popularity changes, all caches of content may not be retained adequately in a cluster, so consumers could not retrieve them from nearby clusters. We therefore propose a dynamic clustering scheme to adjust the cluster size, according to the change of content popularity, considering cache utilization and delivery latency, and evaluated its effectiveness through simulation.

       

  • NDN4IVC: A Framework for Simulations of Realistic VANETs Applications through NDN

    Guilherme B. Araujo (Federal University of Bahia), Maycon Peixoto (Federal University of Bahia), Leobino N. Sampaio (Federal University of Bahia), Guilherme Araujo (Federal University of Bahia)

    • Abstract:

      We present NDN for Inter-Vehicle Communication (NDN4IVC) framework for simulating realistic VANET applications over the NDN architecture. The project uses two popular simulators in the literature for VANET simulation, the network simulator ns3, with the ndnSIM module installed, and SUMO, a simulator for urban mobility. NDN4IVC allows real-time bidirectional communication between SUMO and ns3 to support more data about road traffic and vehicular mobility.

       

  • Resource Reservation in Information Centric Networking

    Uthra Ambalavanan (Robert Bosch GmbH), Naresh Nayak (Robert Bosch GmbH), Dennis Grewe (Robert Bosch GmbH), Nitinder Mohan (Technical University of Munich)

    • Abstract:

      Quality of Service (QoS) is a crucial mechanism where the network manages its finite resources to meet the demands promised for some applications at the cost of forsaking some other applications' needs. Information Centric Networking (ICN), although great at features such as name based addressing, decoupling host from data, in network caching, etc., still offers best effort service. This restricts the network suitability for safety critical applications such as tele-operated driving or real-time multimedia applications that often demand guaranteed bandwidth and delay. Reserving sufficient resources as well as establishing an admission control mechanism is one way to ensure performance guarantees. We present a paper emphasizing the need for a "better than best-effort service" in Named Data Networking (NDN), the functionalities to fulfil for a QoS mechanism and the open challenges in establishing resource reservation in NDN.

       

  • Scaling State Vector Sync

    Varun Patil (UCLA), Sichen Song (UCLA), Guorui Xiao (UCLA), Lixia Zhang (UCLA)

    • Abstract:

      State Vector Sync (SVS) is a Distributed Dataset Synchronization (Sync) protocol designed to support distributed applications running over NDN. SVS encodes raw dataset state in its messages to achieve resilient synchronization with low latency. As a result, the SVS message size grows linearly with the number of data producers in the same communication group, raising concerns about its scalability. This poster proposes a solution to improve SVS's scalability through the use of partial state vectors (p-SVS), and presents the results from our preliminary evaluation. Our results show that p-SVS has similar performance to vanilla SVS with improved scalability.

       

  • Towards an incremental deployment of NDN: robust bootstrapping using in-network indirection

    Kazuaki Ueda ("KDDI Research), Chikara Sasaki (KDDI Research), Atsushi Tagami (KDDI Research)

    • Abstract:

      Incremental deployment of new Internet architecture is a key challenge for the smooth evolution of the current Internet. In NDN, the overlay-based deployment is considered as one of the promising options to provide NDN services over the Internet. To achieve an incremental deployment, it is required to design a bootstrapping mechanism that allows consumers to consistently access to an overlay NDN network in a situation where Autonomous Systems (AS) are gradually deploying NDN routers. In this paper, we analyzed the current bootstrapping and identified its potential issue in specifying the IP address of the closest NDN router. We propose a robust bootstrapping architecture that can work without specifying the exact IP address of a single NDN router. By using in-network indirection, our scheme can provide consistent access to the NDN network independent of the deployment status of each AS.

       

  • On Improving Versatility of Versec Trust Schema

    Proyash Podder (Florida International University), Alexander Afanasyev (Florida International University)

    • Abstract:

      Named Data Networking (NDN) redefines the concept of network security from securing the channel that transports data to securing the data itself by singing each Data packet at the network layer. Trust schema, which defines the relationship between a Data packet and its signer, plays a vital role in NDN security. However, to ensure the proper use of trust schema, it should be easy to define, user-friendly, and most importantly, automated. The recently proposed Versec trust schema is a promising next step for this automation and user-friendliness. Although Versec is designed for versatile security, the initial design choices are mainly targeted at a local environment. However, we want to use Versec in more generalized environments and analyze whether the current binary encoding can achieve it as it is or not. Based on our analysis, we identified several ways to make Versec more versatile.

       

  • Low Latency Internet Livestreaming in Named Data Networking

    Teng Liang (Peng Cheng Laboratory), Yang Zhang (Alibaba Group), Beichuan Zhang (University of Arizona), Weizhe Zhang (Harbin Institute of Technology), Yu Zhang (Harbin Institute of Technology)

    • Abstract:

      Low Latency HTTP Live Streaming (LL-HLS) is a receiver-driven adaptive bitrate Internet streaming protocol, with five low-latency extensions added to HLS. On top of previous HLS/NDN translation work, we investigate NDNizing LL-HLS. Specifically, we design the translation of the five extensions. One lesson learned is that to achieve low-latency real-time communication in NDN is to hold requests until the response is generated at data producer, hence achieving immediate response transmission. On implementing three of the five extensions on top of the HLS/NDN translation work, low-latency livestreaming system is able to run over NDN with the average point of capture to playback latency decreased from 26.7 to 3.5 seconds.

       

  • Intertrust: Establishing Inter-Zone Trust Relationships

    Tianyuan Yu (UCLA), Xinyu Ma (UCLA), Hongcheng Xie (City University of Hong Kong), Yekta Kocaoğullar ("Sabancı University), Lixia Zhang (UCLA)

    • Abstract:

      An NDN network is made of named entities with various trust relations between each other. Entities are organized into trust zones. Each trust zone contains the entities under the same administrative control. This work-in-progress explores an approach to establishing trust relations between trust zones.

       

  • On Supporting Forwarding Strategies and Sync Protocols Through NDN Distance Vector Routing

    Italo Valcy Da Silva Brito (Federal University of Bahia), Leobino N. Sampaio (Federal University of Bahia), Lixia Zhang (UCLA)

    • Abstract:

      Routing, forwarding strategy, and dataset synchronization (sync) are three well-known components of Named Data Networking (NDN). This poster reports a work-in-progress evaluation on the relationship between routing, forwarding strategy, and sync, especially for scenarios with ad hoc mobile conditions with intermittent connectivity.

       

  • On Cache-Aware Dynamic Adaptive Streaming over Information-Centric Networking

    Ryo Nakasuji (Osaka University), Yuki Koizumi (Osaka University), Junji Takemasa (Osaka Univeristy), Toru Hasegawa (Osaka University)

    • Abstract:

      We first discuss effects of in-network caching of ICN on dynamic adaptive streaming (DAS) over ICN. We next preliminarily design a cache-aware DAS algorithm and discuss how the cache-awareness contributes to DAS by comparing the proposal with non-cache-aware DAS algorithms.

       

  • A Global Name Mapping System for ICN-IP Coexistence

    Zhanghuixian Luo (Beijing Institute of Technology), Tianlong Li (Beijing Institute of Technology), qianyu zhang (Beijing Institute of Technology), Yating Yang (Beijing Institute of Technology), Tian Song (Beijing Institute of Technology)

    • Abstract:

      A global name mapping system is required for ICN-IP coexistence. This poster presents a global name mapping system to provide general name mapping services while ensuring query performance and scalability. With efficient general name mapping and dynamic update mechanisms, the system can serve as a common infrastructure in ICN-IP coexistence architecture. We implement the name mapping system, and the preliminary evaluation results show that it outperforms legacy DNS for query performance and is scalable. Compared to BIND 9, the QPS of the system is improved by 130%, and the response time is reduced by more than 60%.

       

  • Wednesday, September 21, 2022

  • 8:00 - 9:00 JST: Panel 2

    Session Chair: Alexander Afanasyev (Florida International University)

  • Panel: ICN and the Metaverse – Challenges and Opportunities


    Abstract:

    Large-scale interactive and networked AR/VR/XR systems are now referred to as Metaverse, and the general assumption is that corresponding applications will be hosted on platforms, similar to those that are employed for web and social media applications today.
    In the web, the platform approach has led to an accelerated development and growth of a few popular mainstream systems. On the other hand, several problems have been observed such as ubiquitous surveillance, lock-in effects, centralization, innovation stagnation, and cost overhead for achieving the required performance.
    - While these phenomena may have both technical and economic root causes, we would like to discuss:
    - How should Metaverse systems be designed, and what would be important architectural pillars?
    - What is the potential for re-imagining Metaverse with information-centric concepts and protocols?
    - Would ICN enable or lead to profound architecturally unique approaches – or would protocols such as NDN be a drop-in replacement for QUIC, HTTP3 etc.?
    - What are the challenges for building ICN-based Metaverse systems, and what it missing in today's ICN platforms?

     

    Panelists:
    Jeff Burke (UCLA)
    Dirk Kutscher (Hong Kong University of Science and Technology )
    Geoff Huston (Chief Scientist, APNIC)
    Lixia Zhang (UCLA)

     

  • Statement: RESTful Information-Centric Networking

    Dirk Kutscher (University of Applied Sciences Emden/Leer), Dave Oran (Network Systems Research & Design)

    • Abstract:

      Web applications today utilize the Representation State Transfer (REST) architectural pattern, depending on HTTP, TLS, and either TCP or QUIC as the protocol substrate to build upon. Our vision is to achieve the key properties of REST using ICN protocols as an alternative. We argue that this is feasible given some of the recent advances in ICN protocol development and that the resulting suite is simpler and potentially having better performance and robustness properties. Our sketch of an ICN-based protocol framework addresses secure and efficient establishment and continuation of REST communication sessions, without giving up key ICN properties, such as consumer anonymity and flow balance.

       

    • Abstract:

      Recent developments in the public imagination of future networked environments provide an opening for the ICN research community to make its case, metaphors to explain the value, and a motivation for specific areas of research. The opportunity is proposed and future research directions are briefly discussed.

       

  • 9:00 - 9:30 JST: Break

  • 9:30 - 10:45 JST: Session 2: Enabling Distributed Applications

    Session Chair: Hitoshi Asaeda (NICT)

  • SoK: The Evolution of Distributed Dataset Synchronization Solutions in NDN

    Philipp Moll (UCLA), Varun Patil (UCLA), Lan Wang (University of Memphis), Lixia Zhang (UCLA)

    • Abstract:

      Distributed dataset synchronization, or Sync in short, plays the role of a transport service in the Named Data Networking (NDN) architecture. A number of NDN Sync protocols have been developed over the last decade. In this paper, we conduct a systematic examination of NDN Sync protocol designs, identify common design patterns, reveal insights behind different design approaches, and collect lessons learned over the years. We show that (i) each Sync protocol can be characterized by its design decisions on three basic components - dataset namespace representation, namespace encoding for sharing, and change notification mechanism, and (ii) two or three types of choices have been observed for each design component. Through analysis and experimental evaluation, we reveal how different design choices influence the latency, reliability, overhead, and security of dataset synchronization. We also discuss the relationship between transport and application naming, the implications of namespace encoding for Sync group scalability, and the fundamental reason behind the need for Sync Interest multicast.

       

  • DICer: Distributed Coordination for In-Network Computations

    Uthra Ambalavanan (Robert Bosch GmbH), Dennis Grewe (Robert Bosch GmbH), Naresh Nayak (Robert Bosch GmbH), Liming Liu (Robert Bosch GmbH), Nitinder Mohan (Technical University Munich), Jorg Ott (Technische Universität München)

    • Abstract:

      Application domains such as automotive and the Internet of Things may benefit from in-network computing to reduce the distance data travels through the network and the response time. Information Centric Networking (ICN) based compute frameworks such as Named Function Networking (NFN) are promising options due to their location independence and loosely-coupled communication model. However, unlike current operations, such solutions may benefit from orchestration across the compute nodes to use the available resources in the network better. In this paper, we adopt the State Vector Synchronization (SVS), an application dataset synchronization protocol in ICN, to enhance the neighborhood knowledge of in-network compute nodes in a distributed fashion. As such, we design distributed coordination for in-network computation (DICer) that assists the service deployments by improving the resolution of compute requests. We evaluate the performance of DICer against NFN and observe an increase in the resource utilization at the edge and a reduction in the request completion time.

       

  • Kua: Distributed Immutable Object Storage over NDN

    Varun Patil (UCLA), Hemil Desai (UCLA), Lixia Zhang (UCLA)

    • Abstract:

      In Named-Data Networking (NDN), all packets are encoded in the Type-Length-Value (TLV) format. TLV encoding and decoding are implemented in every NDN library, and used by all applications and forwarders. Therefore, formal analysis of TLV encoding can assist NDN software development in the simplification of the code base, analysis of the performance, and improvement of robustness. In this paper, we want to bring attention to the subtleties of TLV encoding. As an initial result, we develop a type-theoretical model of TLV encodable types, and give an algorithm to automatically derive encoding and decoding functions. We formally prove that the derived encoding and decoding functions are inverse to each other. To evaluate the practicality of automatically derived algorithms, we implement the proposed algorithms in C++ templates and evaluate them in three aspects: performance, memory usage, and code complexity. Our results show that our C++ library is competitive in these three aspects. Though our implementation is not fully automated, we show that it is possible to have a fully automated library in future that correctly produce the encoding and decoding functions. We also discussed the limitations of our model and problems worth attention. We hope our work can offer a starting point of further research on TLV, especially formal analysis and automated implementation.

       

  • 10:45 - 11:15 JST: Break

  • 11:15 - 12:30 JST: Session 3: ICN Security

    Session Chair: Ken Calvert (University of Kentucky)

  • SoK: Public Key and Namespace Management in NDN

    Pouyan Fotouhi Tehrani (Weizenbaum Institute / Fraunhofer FOKUS), Eric Osterweil (GMU), Thomas Schmidt (HAW Hamburg), Matthias Wählisch (Freie Universität Berlin)

    • Abstract:

      Named data networking (NDN) enables scenarios where decentralized content distribution based on names is the centerpiece of networking. In this paper, we systematize two requirements to enable trust on a global scale in NDN, namespace management and public key management. We provide a framework to systematically assess and evaluate namespace and public key management systems, and relate their features to DNSSEC and Web PKI, the most prominent and accessible implementations of both building blocks on the current Internet. Our systematization of knowledge of existing approaches in NDN highlights strengths and shortcomings to derive options for future research.

       

  • CertRevoke: A Certificate Revocation Framework for Named-Data Networking

    Tianyuan Yu (UCLA), Hongcheng Xie (City University of Hong Kong), Siqi Liu (UCLA), Xinyu Ma (UCLA), Xiaohua Jia (City University of Hong Kong), Lixia Zhang (UCLA)

    • Abstract:

      Named Data Networking (NDN) secures network communications by requiring all data packets to be signed upon production. This requirement makes usable and efficient NDN certificate issuance and revocation essential for NDN operations. In this paper, we first investigate and clarify core concepts related to NDN certificate revocation, then proceed with the design of CertRevoke, an NDN certificate revocation framework. CertRevoke utilizes naming conventions and trust schema to ensure certificate owners and issuers legitimately produce in-network cacheable records for revoked certificates. We evaluate the security properties and performance of CertRevoke through case studies. Our results show that deploying CertRevoke in an operational NDN network is feasible.

       

  • A Type-Theoretic Model on NDN-TLV Encoding

    Xinyu Ma (UCLA), Alexander Afanasyev (Florida International University), Lixia Zhang (UCLA)

    • Abstract:

      In Named-Data Networking (NDN), all packets are encoded in the Type-Length-Value (TLV) format. TLV encoding and decoding are implemented in every NDN library, and used by all applications and forwarders. Therefore, formal analysis of TLV encoding can assist NDN software development in the simplification of the code base, analysis of the performance, and improvement of robustness. In this paper, we want to bring attention to the subtleties of TLV encoding. As an initial result, we develop a type-theoretical model of TLV encodable types, and give an algorithm to automatically derive encoding and decoding functions. We formally prove that the derived encoding and decoding functions are inverse to each other. To evaluate the practicality of automatically derived algorithms, we implement the proposed algorithms in C++ templates and evaluate them in three aspects: performance, memory usage, and code complexity. Our results show that our C++ library is competitive in these three aspects. Though our implementation is not fully automated, we show that it is possible to have a fully automated library in future that correctly produce the encoding and decoding functions. We also discussed the limitations of our model and problems worth attention. We hope our work can offer a starting point of further research on TLV, especially formal analysis and automated implementation.

       

  • 12:30 - 14:00 JST: Lunch Break

  • 14:00 - 15:40 JST: Session 4: ICN Applications and Wireless Networking

    Session Chair: Ruidong Li (Kanazawa University)

  • N-DISE: NDN-based Data Distribution for Large-scale Data-intensive Science

    Edmund Yeh (Northeastern University), Harvey Newman (California Institute of Technology), Lixia Zhang (UCLA), Jason Cong (UCLA), Susmit Shannigrahi (Tennessee Technological University), Yuanhao Wu (Northeastern University), Catalin Iordache (California Institute of Technology), Volkan Mutlu (Northeastern University), Sankalpa Timilsina (Tennessee Technological University), Sichen Song (UCLA), Michael Lo (UCLA), Ran Liu (Google), Chengyu Fan (Pure Storage), Raimondas Sirvinskas (California Institute of Technology), Justas Balcas (California Institute of Technology), Yuezhou Liu (Northeastern University), Davide Pesavento (NIST), Lotfi Benmohamed (NIST), Junxiao Shi (NIST)

    • Abstract:

      To meet unprecedented challenges faced by the world's largest data- and network-intensive science programs, we design and implement a new, highly efficient and field-tested data distribution, caching, access and analysis system for the Large Hadron Collider (LHC) high energy physics (HEP) network and other major science programs. We develop a hierarchical Named Data Networking (NDN) naming scheme for HEP data, implement new consumer and producer applications to interface with the high-performance NDN-DPDK forwarder, and build on recently developed high-throughput NDN caching and forwarding methods. We integrate NDN systems concepts and algorithms with the mainstream data distribution, processing, and management system of the Compact Muon Solenoid (CMS) experiment. We design and prototype stable, high-performance virtual LANs (VLANs) over a continental-scale wide area network testbed. In extensive experiments, our proposed integrated system, named NDN for Data-Intensive Science Experiments (N-DISE), is shown to deliver LHC data over the wide area network (WAN) testbed at throughputs exceeding 31 Gbps between Caltech and StarLight, with dramatically reduced download time.

       

  • Building a Secure mHealth Data Sharing Infrastructure over NDN

    Saurab Dulal (University of Memphis), Nasir Ali (University of Memphis), Adam Robert Thieme (University of Memphis), Tianyuan Yu (UCLA), Siqi Liu (UCLA), Suravi Regmi (University of Memphis), Lixia Zhang (UCLA), Lan Wang (University of Memphis)

    • Abstract:

      Exploratory efforts in mobile health (mHealth) data collection and sharing have achieved promising results. However, fine-grained contextual access control and real-time data sharing are two of the remaining challenges in enabling temporally-precise mHealth intervention. We have developed an NDN-based system called mGuard to address these challenges. mGuard provides a pub-sub API to let users subscribe to real-time mHealth data streams, and uses name-based access control policies and key-policy attribute-based encryption to grant fine-grained data access to authorized users based on contextual information. We evaluate mGuard's performance using sample data from the MD2K project.

       

  • Delay-Tolerant ICN and Its Application to LoRa

    Peter Kietzmann (HAW Hamburg), José Alamos (HAW Hamburg), Dirk Kutscher (Hochschule Emden/Leer), Thomas Schmidt (HAW Hamburg), Matthias Wählisch (Freie Universität Berlin)

    • Abstract:

      Connecting long-range wireless networks to the Internet imposes challenges due to vastly longer round-trip-times (RTTs). In this paper, we present an ICN protocol framework that enables robust and efficient delay-tolerant communication to edge networks. Our approach provides ICN-idiomatic communication between networks with vastly different RTTs. We applied this framework to LoRa, enabling end-to-end consumer-to-LoRa-producer interaction over an ICN-Internet and asynchronous data production in the LoRa edge. Instead of using LoRaWAN, we implemented an IEEE 802.15.4e DSME MAC layer on top of the LoRa PHY and ICN protocol mechanisms in RIOT OS. Executed on off-the-shelf IoT hardware, we provide a comparative evaluation for basic NDN-style ICN [60], RICE [31]-like pulling, and reflexive forwarding [46]. This is the first practical evaluation of ICN over LoRa using a reliable MAC. Our results show that periodic polling in NDN works inefficiently when facing long and differing RTTs. RICE reduces polling overhead and exploits gateway knowledge, without violating ICN principles. Reflexive forwarding reflects sporadic data generation naturally. Combined with a local data push, it operates efficiently and enables lifetimes of ≥1 year for battery powered LoRa-ICN nodes.

       

  • iCast: Dynamic Information-Centric Cross-Layer Multicast for Wireless Edge Network

    Tianlong Li (Beijing Institute of Technology), Tian Song (Beijing Institute of Technology), Yating Yang (Beijing Institute of Technology), Jike Yang (Beijing Institute of Technology)

    • Abstract:

      The native multicast support in Named Data Networking (NDN) is an attractive feature, as multicast content delivery can reduce the redundant traffic and improve the network performance, especially in the wireless edge network. With the awareness of content, NDN routers automatically aggregate the same requests from different end hosts and establish network-layer multicast. However, the current link-layer multicast based on host-centric MAC address management is inflexible. Consequently, supporting NDN dynamic multicast with the current link-layer architecture remains a challenge. In this paper, we propose iCast, short for dynamic information-centric multicast, to enable dynamic multicast in the link layer. Our work has three major contributions. First, iCast collaborates NDN native multicast with the host-centric link layer and meanwhile keeps the host-centric property of the current link layer. Second, iCast achieves per-packet dynamic multicast in the link layer and we further propose a hash-based iCast variant for dynamic connection. Third, iCast is implemented in real testbed and the evaluation results show that iCast reduces up to 59.53% traffic compared with vanilla NDN. iCast bridges the gap between NDN multicast and the host-centric link-layer multicast.

       

  • 15:40 - 16:00 JST: Closing

Remote Program

Schedule at a Glance

Conference Schedule at a Glance

Schedule

  • Monday, September 19, 2022

  • All Day: Recorded Tutorials

  • The recorded videos at the in-person program are uploaded to the WebEX cloud. Remote participants watch the videos at their convenience.

  • Tutorial1: Evaluating NDN using ndnSIM and Mini-NDN

  • Tutorial2: CCNx-based Cloud-Native Function Networking and Applications

  • Tutorial3: Zenoh: Data-Centric Communication for the Cloud-to-Things Continuum

  • Tuesday, September 20, 2022

  • 13:00 - 13:30 UTC: Opening

  • 13:30 - 14:30 UTC: Keynote (Streaming)

  • Keynote: Travels with ICN - The Road Traversed and the Road Ahead

    David R. Oran (Network Systems Research & Design)


    Abstract: In this talk I give a biased retrospective on ten years of ICN research, and some hopefully controversial thoughts on where we might go for the next ten.

     

    Bio: David Oran was until 2016 a Fellow at Cisco Systems. He is now independent and pursuing his research interests in a number of areas, including in-network computing and Information Centric Networking. He also has an appointment as a Research Affiliate at the MIT Media Laboratory. His recent work has been in congestion control for ICN and using ICN as a substrate for modern distributed computing languages. His long term technical interests lie in the areas of Quality of Service, Internet multimedia, routing, and security. He was part of the original team that started Cisco's Voice-over-IP business in 1996 and helped grow it into a multi-billion dollar revenue stream.
    Prior to joining Cisco, Mr. Oran worked in the network architecture group at Digital Equipment, where he designed routing algorithms and a distributed directory system. Mr. Oran has led a number of industry standards efforts. He was a member of the Internet Architecture Board, co-chair of the Speech Services working group, and served a term as area director for Routing in the IETF. He currently serves as co-Chair of the Information Centric Networking Research Group of the IRTF. He was on the board of the SIP Forum from its inception through 2008. He also serves on the technical advisory boards of a number of venture-backed firms in the networking and telecommunication sectors.
    Mr. Oran has a B.A. in English from Haverford College.

     

  • 14:30 - 15:30 UTC: Panel 1 (Streaming)

  • Panel: Hard Lessons for ICN from IP Multicast?


    Panelists:
    Jon Crowcroft (University of Cambridge, UK)
    Dave Oran (Network Systems Research & Design, US)
    George Xylomenos (Athens University of Economics and Business, GR)

     

  • Statement: Hard Lessons for ICN from IP multicast

    Jon Crowcroft (University of Cambridge)

    • Abstract:

      In this brief statement, we trace the line of thought from Internet Multicast through to Information Centric Networking, and use this to outline what we think should have been the priorities in ICN work from the start.

       

  • 15:30 - 16:00 UTC: Break

  • 16:00 - 17:30 UTC: Session 1: ICN Forwarding and Congestion Control (Streaming and Q&A)

    Session Chair: Haoyu Wang (Yale University)

  • ZQTRTT: A Multipath Scheduler for Heterogeneous Traffic in ICNs Based on Zero Queueing Time Ratio

    Bengt Ahlgren (RISE), Karl-Johan Grinnemo (Karlstad University)

    • Abstract:

      Information-centric networks (ICNs) intrinsically support multipath transfer and thus have been seen as an exciting paradigm for IoT and edge computing, not least in the context of 5G mobile networks. One key to ICN's success in these and other networks that have to support a diverse set of services over a heterogeneous network infrastructure is to schedule traffic over the available network paths efficiently. This paper presents and evaluates ZQTRTT, a multipath scheduling scheme for ICN that load balances bulk traffic over available network paths and schedules latency-sensitive, non-bulk traffic to reduce its transfer delay. A new metric called zero queueing time (ZQT) ratio estimates path load and is used to compute forwarding fractions for load balancing. In particular, the paper shows through a simulation campaign that ZQTRTT can accommodate the demands of both latency-sensitive and -insensitive traffic as well as evenly distribute traffic over available network paths.

       

  • Effective NDN Congestion Control Based on Queue Size Feedback

    Sichen Song (UCLA), Lixia Zhang (UCLA)

    • Abstract:

      Named data networking (NDN) can improve the consumer data retrieval throughput with its built-in multicast data delivery, innetwork caching, and ability to support multi-path forwarding. However, their realization brings challenges. In this work, we first examine how multi-path forwarding and in-network caching can interfere with consumer measurements for congestion control. Based on the results, we propose a congestion control solution, NDN-QSF, that can work effectively in the presence of in-network caching. In NDN-QSF, forwarders estimate upstream bandwidth and use queue size as congestion feedback to inform downstream routers to limit interest transmission rates. We further adapt and extend NDN-QSF to enable routers to make informed multi-path forwarding decisions. We evaluated NDN-QSF through simulation experimentation and our results show that NDN-QSF can effectively control congestion by using queue size as congestion feedback and improve network throughput with multi-path forwarding.

       

  • OPSEL: Optimal Producer Selection under Data Redundancy in Wireless Edge Environments

    Mohammed Elbadry (Stony Brook University), Fan Ye (Stony Brook University), Peter Milder (Stony Brook University)

    • Abstract:

      In wireless edge environments, data redundancy among multiple neighboring nodes is common due to the need to support application performance, mitigate faults, or the intrinsic nature of applications (e.g., AR/VR, edge storage). Further, under data centric paradigms (e.g., Named Data Networking (NDN)), consumers that request the same data may leverage multicast so data are sent only once (e.g., VR games with data cached at multiple edge nodes). Naive strategies such as selecting a random neighbor or the prevailing wisdom of choosing the one with the strongest received signal strength (RSSI) cause more severe loss than other available producers. In this paper, we propose OPSEL, a single-hop dynamic producer(s) selection protocol that enables single and multiple consumers to continuously identify the optimal producer(s) (e.g., lowest loss) under constantly varying medium conditions. When Data is available single-hop, OPSEL's goal is to have the minimum number of producers sending to all consumers and meeting their performance needs without explicit coordination messages. Experiments on a real prototype show that OPSEL is 3% away in loss rate and has the same latency as the theoretical ideal, while naive timer methods can incur up to 60% more loss and 2-3× latency.

       

  • 17:30 - 18:00 UTC: Break

  • 18:00 - 18:50 UTC: Poster/Demo (Streaming)

  • Adaptive Duplicate Suppression for Multicasting in Multi-Access NDN Network

    Saurab Dulal (The University of Memphis), Lan wang (University of Memphis)

    • Abstract:

      This poster presents our ongoing work on adaptive duplicate suppression for multicasting in a multi-access NDN network. It includes our design, implementation, and some preliminary evaluation results. Our early evaluation shows a substantial reduction in duplicate traffic in NDN multicast communication.

       

  • Information-Centric Service Mesh for Autonomous In-network Computing

    Kenji Kanai (Waseda University), Toshitaka Tsuda (Waseda University), Hidenori Nakazato (Waseda University), Jiro Katto (Waseda University)

    • Abstract:

      In this paper, we introduce an information-centric service mesh for autonomous in-network computing. The information-centric service mesh offers service-centric networking, not connectivity-based networking provided by the current container orchestration, like Kubernetes (K8s). We implement the information-centric service mesh by adopting an ambassador container style and using Cefore and Cefpyco which is the CCNx software implementation developed by NICT in Japan. For the proof-of-concept test, we demonstrate the end-to-end delay of more complex service chain models (up to 17 nodes) on our K8s cluster.

       

  • Popularity-Aware Dynamic Clustering Scheme for Distributed Caching in ICN

    Mikiya Yoshida (University of Kitakyushu), Yusuke Ito (University of Kitakyushu), Yurino Sato (National Institute of Technology), Hiroyuki Koga (University of Kitakyushu)

    • Abstract:

      To realize low-latency content delivery in Information-Centric Networking, a scheme to cluster domains and retain popular content in each cluster has been proposed, which enables consumers to retrieve content from nearby clusters. However, when the distribution of content popularity changes, all caches of content may not be retained adequately in a cluster, so consumers could not retrieve them from nearby clusters. We therefore propose a dynamic clustering scheme to adjust the cluster size, according to the change of content popularity, considering cache utilization and delivery latency, and evaluated its effectiveness through simulation.

       

  • NDN4IVC: A Framework for Simulations of Realistic VANETs Applications through NDN

    Guilherme B. Araujo (Federal University of Bahia), Maycon Peixoto (Federal University of Bahia), Leobino N. Sampaio (Federal University of Bahia), Guilherme Araujo (Federal University of Bahia)

    • Abstract:

      We present NDN for Inter-Vehicle Communication (NDN4IVC) framework for simulating realistic VANET applications over the NDN architecture. The project uses two popular simulators in the literature for VANET simulation, the network simulator ns3, with the ndnSIM module installed, and SUMO, a simulator for urban mobility. NDN4IVC allows real-time bidirectional communication between SUMO and ns3 to support more data about road traffic and vehicular mobility.

       

  • Resource Reservation in Information Centric Networking

    Uthra Ambalavanan (Robert Bosch GmbH), Naresh Nayak (Robert Bosch GmbH), Dennis Grewe (Robert Bosch GmbH), Nitinder Mohan (Technical University of Munich)

    • Abstract:

      Quality of Service (QoS) is a crucial mechanism where the network manages its finite resources to meet the demands promised for some applications at the cost of forsaking some other applications' needs. Information Centric Networking (ICN), although great at features such as name based addressing, decoupling host from data, in network caching, etc., still offers best effort service. This restricts the network suitability for safety critical applications such as tele-operated driving or real-time multimedia applications that often demand guaranteed bandwidth and delay. Reserving sufficient resources as well as establishing an admission control mechanism is one way to ensure performance guarantees. We present a paper emphasizing the need for a "better than best-effort service" in Named Data Networking (NDN), the functionalities to fulfil for a QoS mechanism and the open challenges in establishing resource reservation in NDN.

       

  • Scaling State Vector Sync

    Varun Patil (UCLA), Sichen Song (UCLA), Guorui Xiao (UCLA), Lixia Zhang (UCLA)

    • Abstract:

      State Vector Sync (SVS) is a Distributed Dataset Synchronization (Sync) protocol designed to support distributed applications running over NDN. SVS encodes raw dataset state in its messages to achieve resilient synchronization with low latency. As a result, the SVS message size grows linearly with the number of data producers in the same communication group, raising concerns about its scalability. This poster proposes a solution to improve SVS's scalability through the use of partial state vectors (p-SVS), and presents the results from our preliminary evaluation. Our results show that p-SVS has similar performance to vanilla SVS with improved scalability.

       

  • Towards an incremental deployment of NDN: robust bootstrapping using in-network indirection

    Kazuaki Ueda ("KDDI Research), Chikara Sasaki (KDDI Research), Atsushi Tagami (KDDI Research)

    • Abstract:

      Incremental deployment of new Internet architecture is a key challenge for the smooth evolution of the current Internet. In NDN, the overlay-based deployment is considered as one of the promising options to provide NDN services over the Internet. To achieve an incremental deployment, it is required to design a bootstrapping mechanism that allows consumers to consistently access to an overlay NDN network in a situation where Autonomous Systems (AS) are gradually deploying NDN routers. In this paper, we analyzed the current bootstrapping and identified its potential issue in specifying the IP address of the closest NDN router. We propose a robust bootstrapping architecture that can work without specifying the exact IP address of a single NDN router. By using in-network indirection, our scheme can provide consistent access to the NDN network independent of the deployment status of each AS.

       

  • On Improving Versatility of Versec Trust Schema

    Proyash Podder (Florida International University), Alexander Afanasyev (Florida International University)

    • Abstract:

      Named Data Networking (NDN) redefines the concept of network security from securing the channel that transports data to securing the data itself by singing each Data packet at the network layer. Trust schema, which defines the relationship between a Data packet and its signer, plays a vital role in NDN security. However, to ensure the proper use of trust schema, it should be easy to define, user-friendly, and most importantly, automated. The recently proposed Versec trust schema is a promising next step for this automation and user-friendliness. Although Versec is designed for versatile security, the initial design choices are mainly targeted at a local environment. However, we want to use Versec in more generalized environments and analyze whether the current binary encoding can achieve it as it is or not. Based on our analysis, we identified several ways to make Versec more versatile.

       

  • Low Latency Internet Livestreaming in Named Data Networking

    Teng Liang (Peng Cheng Laboratory), Yang Zhang (Alibaba Group), Beichuan Zhang (University of Arizona), Weizhe Zhang (Harbin Institute of Technology), Yu Zhang (Harbin Institute of Technology)

    • Abstract:

      Low Latency HTTP Live Streaming (LL-HLS) is a receiver-driven adaptive bitrate Internet streaming protocol, with five low-latency extensions added to HLS. On top of previous HLS/NDN translation work, we investigate NDNizing LL-HLS. Specifically, we design the translation of the five extensions. One lesson learned is that to achieve low-latency real-time communication in NDN is to hold requests until the response is generated at data producer, hence achieving immediate response transmission. On implementing three of the five extensions on top of the HLS/NDN translation work, low-latency livestreaming system is able to run over NDN with the average point of capture to playback latency decreased from 26.7 to 3.5 seconds.

       

  • Intertrust: Establishing Inter-Zone Trust Relationships

    Tianyuan Yu (UCLA), Xinyu Ma (UCLA), Hongcheng Xie (City University of Hong Kong), Yekta Kocaoğullar ("Sabancı University), Lixia Zhang (UCLA)

    • Abstract:

      An NDN network is made of named entities with various trust relations between each other. Entities are organized into trust zones. Each trust zone contains the entities under the same administrative control. This work-in-progress explores an approach to establishing trust relations between trust zones.

       

  • On Supporting Forwarding Strategies and Sync Protocols Through NDN Distance Vector Routing

    Italo Valcy Da Silva Brito (Federal University of Bahia), Leobino N. Sampaio (Federal University of Bahia), Lixia Zhang (UCLA)

    • Abstract:

      Routing, forwarding strategy, and dataset synchronization (sync) are three well-known components of Named Data Networking (NDN). This poster reports a work-in-progress evaluation on the relationship between routing, forwarding strategy, and sync, especially for scenarios with ad hoc mobile conditions with intermittent connectivity.

       

  • On Cache-Aware Dynamic Adaptive Streaming over Information-Centric Networking

    Ryo Nakasuji (Osaka University), Yuki Koizumi (Osaka University), Junji Takemasa (Osaka Univeristy), Toru Hasegawa (Osaka University)

    • Abstract:

      We first discuss effects of in-network caching of ICN on dynamic adaptive streaming (DAS) over ICN. We next preliminarily design a cache-aware DAS algorithm and discuss how the cache-awareness contributes to DAS by comparing the proposal with non-cache-aware DAS algorithms.

       

  • A Global Name Mapping System for ICN-IP Coexistence

    Zhanghuixian Luo (Beijing Institute of Technology), Tianlong Li (Beijing Institute of Technology), qianyu zhang (Beijing Institute of Technology), Yating Yang (Beijing Institute of Technology), Tian Song (Beijing Institute of Technology)

    • Abstract:

      A global name mapping system is required for ICN-IP coexistence. This poster presents a global name mapping system to provide general name mapping services while ensuring query performance and scalability. With efficient general name mapping and dynamic update mechanisms, the system can serve as a common infrastructure in ICN-IP coexistence architecture. We implement the name mapping system, and the preliminary evaluation results show that it outperforms legacy DNS for query performance and is scalable. Compared to BIND 9, the QPS of the system is improved by 130%, and the response time is reduced by more than 60%.

       

  • Wednesday, September 21, 2022

  • 13:00 - 14:00 UTC: Panel 2 (Streaming)

  • Panel: ICN and the Metaverse – Challenges and Opportunities


    Abstract:

    Large-scale interactive and networked AR/VR/XR systems are now referred to as Metaverse, and the general assumption is that corresponding applications will be hosted on platforms, similar to those that are employed for web and social media applications today.
    In the web, the platform approach has led to an accelerated development and growth of a few popular mainstream systems. On the other hand, several problems have been observed such as ubiquitous surveillance, lock-in effects, centralization, innovation stagnation, and cost overhead for achieving the required performance.
    - While these phenomena may have both technical and economic root causes, we would like to discuss:
    - How should Metaverse systems be designed, and what would be important architectural pillars?
    - What is the potential for re-imagining Metaverse with information-centric concepts and protocols?
    - Would ICN enable or lead to profound architecturally unique approaches – or would protocols such as NDN be a drop-in replacement for QUIC, HTTP3 etc.?
    - What are the challenges for building ICN-based Metaverse systems, and what it missing in today's ICN platforms?

     

    Panelists:
    Jeff Burke (UCLA)
    Dirk Kutscher (Hong Kong University of Science and Technology )
    Geoff Huston (Chief Scientist, APNIC)
    Lixia Zhang (UCLA)

     

  • Statement: RESTful Information-Centric Networking

    Dirk Kutscher (University of Applied Sciences Emden/Leer), Dave Oran (Network Systems Research & Design)

    • Abstract:

      Web applications today utilize the Representation State Transfer (REST) architectural pattern, depending on HTTP, TLS, and either TCP or QUIC as the protocol substrate to build upon. Our vision is to achieve the key properties of REST using ICN protocols as an alternative. We argue that this is feasible given some of the recent advances in ICN protocol development and that the resulting suite is simpler and potentially having better performance and robustness properties. Our sketch of an ICN-based protocol framework addresses secure and efficient establishment and continuation of REST communication sessions, without giving up key ICN properties, such as consumer anonymity and flow balance.

       

    • Abstract:

      Recent developments in the public imagination of future networked environments provide an opening for the ICN research community to make its case, metaphors to explain the value, and a motivation for specific areas of research. The opportunity is proposed and future research directions are briefly discussed.

       

  • 14:00 - 14:30 UTC: Break

  • 14:30 - 16:00 UTC: Session 2: Enabling Distributed Applications (Streaming and Q&A)

    Session Chair: Dirk Kutscher (University of Applied Sciences Emden/Leer)

  • SoK: The Evolution of Distributed Dataset Synchronization Solutions in NDN

    Philipp Moll (UCLA), Varun Patil (UCLA), Lan Wang (University of Memphis), Lixia Zhang (UCLA)

    • Abstract:

      Distributed dataset synchronization, or Sync in short, plays the role of a transport service in the Named Data Networking (NDN) architecture. A number of NDN Sync protocols have been developed over the last decade. In this paper, we conduct a systematic examination of NDN Sync protocol designs, identify common design patterns, reveal insights behind different design approaches, and collect lessons learned over the years. We show that (i) each Sync protocol can be characterized by its design decisions on three basic components - dataset namespace representation, namespace encoding for sharing, and change notification mechanism, and (ii) two or three types of choices have been observed for each design component. Through analysis and experimental evaluation, we reveal how different design choices influence the latency, reliability, overhead, and security of dataset synchronization. We also discuss the relationship between transport and application naming, the implications of namespace encoding for Sync group scalability, and the fundamental reason behind the need for Sync Interest multicast.

       

  • DICer: Distributed Coordination for In-Network Computations

    Uthra Ambalavanan (Robert Bosch GmbH), Dennis Grewe (Robert Bosch GmbH), Naresh Nayak (Robert Bosch GmbH), Liming Liu (Robert Bosch GmbH), Nitinder Mohan (Technical University Munich), Jorg Ott (Technische Universität München)

    • Abstract:

      Application domains such as automotive and the Internet of Things may benefit from in-network computing to reduce the distance data travels through the network and the response time. Information Centric Networking (ICN) based compute frameworks such as Named Function Networking (NFN) are promising options due to their location independence and loosely-coupled communication model. However, unlike current operations, such solutions may benefit from orchestration across the compute nodes to use the available resources in the network better. In this paper, we adopt the State Vector Synchronization (SVS), an application dataset synchronization protocol in ICN, to enhance the neighborhood knowledge of in-network compute nodes in a distributed fashion. As such, we design distributed coordination for in-network computation (DICer) that assists the service deployments by improving the resolution of compute requests. We evaluate the performance of DICer against NFN and observe an increase in the resource utilization at the edge and a reduction in the request completion time.

       

  • Kua: Distributed Immutable Object Storage over NDN

    Varun Patil (UCLA), Hemil Desai (UCLA), Lixia Zhang (UCLA)

    • Abstract:

      In Named-Data Networking (NDN), all packets are encoded in the Type-Length-Value (TLV) format. TLV encoding and decoding are implemented in every NDN library, and used by all applications and forwarders. Therefore, formal analysis of TLV encoding can assist NDN software development in the simplification of the code base, analysis of the performance, and improvement of robustness. In this paper, we want to bring attention to the subtleties of TLV encoding. As an initial result, we develop a type-theoretical model of TLV encodable types, and give an algorithm to automatically derive encoding and decoding functions. We formally prove that the derived encoding and decoding functions are inverse to each other. To evaluate the practicality of automatically derived algorithms, we implement the proposed algorithms in C++ templates and evaluate them in three aspects: performance, memory usage, and code complexity. Our results show that our C++ library is competitive in these three aspects. Though our implementation is not fully automated, we show that it is possible to have a fully automated library in future that correctly produce the encoding and decoding functions. We also discussed the limitations of our model and problems worth attention. We hope our work can offer a starting point of further research on TLV, especially formal analysis and automated implementation.

       

  • 16:00 -16:30 UTC: Break

  • 16:30 - 18:00 UTC: Session 3: ICN Security (Streaming and Q&A)

    Session Chair: Marie-Jose Montpetit (Concordia University/Telecom Paris-Sud)

  • SoK: Public Key and Namespace Management in NDN

    Pouyan Fotouhi Tehrani (Weizenbaum Institute / Fraunhofer FOKUS), Eric Osterweil (GMU), Thomas Schmidt (HAW Hamburg), Matthias Wählisch (Freie Universität Berlin)

    • Abstract:

      Named data networking (NDN) enables scenarios where decentralized content distribution based on names is the centerpiece of networking. In this paper, we systematize two requirements to enable trust on a global scale in NDN, namespace management and public key management. We provide a framework to systematically assess and evaluate namespace and public key management systems, and relate their features to DNSSEC and Web PKI, the most prominent and accessible implementations of both building blocks on the current Internet. Our systematization of knowledge of existing approaches in NDN highlights strengths and shortcomings to derive options for future research.

       

  • CertRevoke: A Certificate Revocation Framework for Named-Data Networking

    Tianyuan Yu (UCLA), Hongcheng Xie (City University of Hong Kong), Siqi Liu (UCLA), Xinyu Ma (UCLA), Xiaohua Jia (City University of Hong Kong), Lixia Zhang (UCLA)

    • Abstract:

      Named Data Networking (NDN) secures network communications by requiring all data packets to be signed upon production. This requirement makes usable and efficient NDN certificate issuance and revocation essential for NDN operations. In this paper, we first investigate and clarify core concepts related to NDN certificate revocation, then proceed with the design of CertRevoke, an NDN certificate revocation framework. CertRevoke utilizes naming conventions and trust schema to ensure certificate owners and issuers legitimately produce in-network cacheable records for revoked certificates. We evaluate the security properties and performance of CertRevoke through case studies. Our results show that deploying CertRevoke in an operational NDN network is feasible.

       

  • A Type-Theoretic Model on NDN-TLV Encoding

    Xinyu Ma (UCLA), Alexander Afanasyev (Florida International University), Lixia Zhang (UCLA)

    • Abstract:

      In Named-Data Networking (NDN), all packets are encoded in the Type-Length-Value (TLV) format. TLV encoding and decoding are implemented in every NDN library, and used by all applications and forwarders. Therefore, formal analysis of TLV encoding can assist NDN software development in the simplification of the code base, analysis of the performance, and improvement of robustness. In this paper, we want to bring attention to the subtleties of TLV encoding. As an initial result, we develop a type-theoretical model of TLV encodable types, and give an algorithm to automatically derive encoding and decoding functions. We formally prove that the derived encoding and decoding functions are inverse to each other. To evaluate the practicality of automatically derived algorithms, we implement the proposed algorithms in C++ templates and evaluate them in three aspects: performance, memory usage, and code complexity. Our results show that our C++ library is competitive in these three aspects. Though our implementation is not fully automated, we show that it is possible to have a fully automated library in future that correctly produce the encoding and decoding functions. We also discussed the limitations of our model and problems worth attention. We hope our work can offer a starting point of further research on TLV, especially formal analysis and automated implementation.

       

  • 18:00 - 18:30 UTC: Break

  • 18:30 - 20:25 UTC: Session 4: ICN Applications and Wireless Networking (Streaming and Q&A)

    Session Chair: Rehmat Ullah (University of St Andrews)

  • N-DISE: NDN-based Data Distribution for Large-scale Data-intensive Science

    Edmund Yeh (Northeastern University), Harvey Newman (California Institute of Technology), Lixia Zhang (UCLA), Jason Cong (UCLA), Susmit Shannigrahi (Tennessee Technological University), Yuanhao Wu (Northeastern University), Catalin Iordache (California Institute of Technology), Volkan Mutlu (Northeastern University), Sankalpa Timilsina (Tennessee Technological University), Sichen Song (UCLA), Michael Lo (UCLA), Ran Liu (Google), Chengyu Fan (Pure Storage), Raimondas Sirvinskas (California Institute of Technology), Justas Balcas (California Institute of Technology), Yuezhou Liu (Northeastern University), Davide Pesavento (NIST), Lotfi Benmohamed (NIST), Junxiao Shi (NIST)

    • Abstract:

      To meet unprecedented challenges faced by the world's largest data- and network-intensive science programs, we design and implement a new, highly efficient and field-tested data distribution, caching, access and analysis system for the Large Hadron Collider (LHC) high energy physics (HEP) network and other major science programs. We develop a hierarchical Named Data Networking (NDN) naming scheme for HEP data, implement new consumer and producer applications to interface with the high-performance NDN-DPDK forwarder, and build on recently developed high-throughput NDN caching and forwarding methods. We integrate NDN systems concepts and algorithms with the mainstream data distribution, processing, and management system of the Compact Muon Solenoid (CMS) experiment. We design and prototype stable, high-performance virtual LANs (VLANs) over a continental-scale wide area network testbed. In extensive experiments, our proposed integrated system, named NDN for Data-Intensive Science Experiments (N-DISE), is shown to deliver LHC data over the wide area network (WAN) testbed at throughputs exceeding 31 Gbps between Caltech and StarLight, with dramatically reduced download time.

       

  • Building a Secure mHealth Data Sharing Infrastructure over NDN

    Saurab Dulal (University of Memphis), Nasir Ali (University of Memphis), Adam Robert Thieme (University of Memphis), Tianyuan Yu (UCLA), Siqi Liu (UCLA), Suravi Regmi (University of Memphis), Lixia Zhang (UCLA), Lan Wang (University of Memphis)

    • Abstract:

      Exploratory efforts in mobile health (mHealth) data collection and sharing have achieved promising results. However, fine-grained contextual access control and real-time data sharing are two of the remaining challenges in enabling temporally-precise mHealth intervention. We have developed an NDN-based system called mGuard to address these challenges. mGuard provides a pub-sub API to let users subscribe to real-time mHealth data streams, and uses name-based access control policies and key-policy attribute-based encryption to grant fine-grained data access to authorized users based on contextual information. We evaluate mGuard's performance using sample data from the MD2K project.

       

  • Delay-Tolerant ICN and Its Application to LoRa

    Peter Kietzmann (HAW Hamburg), José Alamos (HAW Hamburg), Dirk Kutscher (Hochschule Emden/Leer), Thomas Schmidt (HAW Hamburg), Matthias Wählisch (Freie Universität Berlin)

    • Abstract:

      Connecting long-range wireless networks to the Internet imposes challenges due to vastly longer round-trip-times (RTTs). In this paper, we present an ICN protocol framework that enables robust and efficient delay-tolerant communication to edge networks. Our approach provides ICN-idiomatic communication between networks with vastly different RTTs. We applied this framework to LoRa, enabling end-to-end consumer-to-LoRa-producer interaction over an ICN-Internet and asynchronous data production in the LoRa edge. Instead of using LoRaWAN, we implemented an IEEE 802.15.4e DSME MAC layer on top of the LoRa PHY and ICN protocol mechanisms in RIOT OS. Executed on off-the-shelf IoT hardware, we provide a comparative evaluation for basic NDN-style ICN [60], RICE [31]-like pulling, and reflexive forwarding [46]. This is the first practical evaluation of ICN over LoRa using a reliable MAC. Our results show that periodic polling in NDN works inefficiently when facing long and differing RTTs. RICE reduces polling overhead and exploits gateway knowledge, without violating ICN principles. Reflexive forwarding reflects sporadic data generation naturally. Combined with a local data push, it operates efficiently and enables lifetimes of ≥1 year for battery powered LoRa-ICN nodes.

       

  • iCast: Dynamic Information-Centric Cross-Layer Multicast for Wireless Edge Network

    Tianlong Li (Beijing Institute of Technology), Tian Song (Beijing Institute of Technology), Yating Yang (Beijing Institute of Technology), Jike Yang (Beijing Institute of Technology)

    • Abstract:

      The native multicast support in Named Data Networking (NDN) is an attractive feature, as multicast content delivery can reduce the redundant traffic and improve the network performance, especially in the wireless edge network. With the awareness of content, NDN routers automatically aggregate the same requests from different end hosts and establish network-layer multicast. However, the current link-layer multicast based on host-centric MAC address management is inflexible. Consequently, supporting NDN dynamic multicast with the current link-layer architecture remains a challenge. In this paper, we propose iCast, short for dynamic information-centric multicast, to enable dynamic multicast in the link layer. Our work has three major contributions. First, iCast collaborates NDN native multicast with the host-centric link layer and meanwhile keeps the host-centric property of the current link layer. Second, iCast achieves per-packet dynamic multicast in the link layer and we further propose a hash-based iCast variant for dynamic connection. Third, iCast is implemented in real testbed and the evaluation results show that iCast reduces up to 59.53% traffic compared with vanilla NDN. iCast bridges the gap between NDN multicast and the host-centric link-layer multicast.