skip to main content
10.1145/2984356.2985241acmconferencesArticle/Chapter ViewAbstractPublication PagescommConference Proceedingsconference-collections
poster
Public Access

In-Network Retransmissions in Named Data Networking

Published: 26 September 2016 Publication History

Abstract

A core mechanism in every forwarding strategy is the decision of whether to retransmit an unsatisfied Interest or to wait for an application retransmission. While some applications request control of all retransmissions, others rely on the assumption that the strategy will retransmit an Interest when it is not satisfied. Although an application can select the forwarding strategy used in the local host, it cannot guarantee that the same strategy will be selected in other nodes in the network, especially in shared resource environments.
In this paper we propose a simple forwarding strategy abstraction that allows the application to decide whether a network retransmission is required, and to differentiate application retransmissions from network retransmissions.

References

[1]
Lixia Zhang et al. Named data networking. ACM SIGCOMM Computer Communication Review, 2014.
[2]
Project CCNx. http://www.ccnx.org/.
[3]
Hila Ben Abraham et al. Forwarding strategies for applications in named data networking. In Proceedings of the 2016 Symposium on Architectures for Networking and Communications Systems, pages 111–112. ACM, 2016.
[4]
Alexander Afanasyev et al. Nfd developer's guide. Technical report, NDN-0021, NDN, 2014.
[5]
Ze'ev Lailari et al. Experiments with the emulated ndn testbed in onl. In Proceedings of the 2nd International Conference on Information-Centric Networking, pages 219–220. ACM, 2015.

Cited By

View all
  • (2023)Performance analysis of self-learning forwarding algorithms for Vehicle-to-Vehicle networks on Named Data Networking (NDN)2023 IEEE 13th Annual Computing and Communication Workshop and Conference (CCWC)10.1109/CCWC57344.2023.10099191(0035-0040)Online publication date: 8-Mar-2023
  • (2021)SmartDetour: Defending Blackhole and Content Poisoning Attacks in IoT NDN NetworksIEEE Internet of Things Journal10.1109/JIOT.2021.30615318:15(12119-12136)Online publication date: 1-Aug-2021
  • (2020)EFM: An Edge-Computing-Oriented Forwarding Mechanism for Information-Centric Networks2020 3rd International Conference on Hot Information-Centric Networking (HotICN)10.1109/HotICN50779.2020.9350827(154-159)Online publication date: 12-Dec-2020
  • Show More Cited By

Index Terms

  1. In-Network Retransmissions in Named Data Networking

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    ACM-ICN '16: Proceedings of the 3rd ACM Conference on Information-Centric Networking
    September 2016
    275 pages
    ISBN:9781450344678
    DOI:10.1145/2984356
    Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 26 September 2016

    Check for updates

    Author Tags

    1. Application Abstraction in NDN
    2. Forwarding Strategies
    3. NDN
    4. Named Data Networking
    5. Retransmissions

    Qualifiers

    • Poster

    Funding Sources

    Conference

    ICN'16
    Sponsor:

    Acceptance Rates

    ACM-ICN '16 Paper Acceptance Rate 23 of 84 submissions, 27%;
    Overall Acceptance Rate 133 of 482 submissions, 28%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)75
    • Downloads (Last 6 weeks)8
    Reflects downloads up to 15 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2023)Performance analysis of self-learning forwarding algorithms for Vehicle-to-Vehicle networks on Named Data Networking (NDN)2023 IEEE 13th Annual Computing and Communication Workshop and Conference (CCWC)10.1109/CCWC57344.2023.10099191(0035-0040)Online publication date: 8-Mar-2023
    • (2021)SmartDetour: Defending Blackhole and Content Poisoning Attacks in IoT NDN NetworksIEEE Internet of Things Journal10.1109/JIOT.2021.30615318:15(12119-12136)Online publication date: 1-Aug-2021
    • (2020)EFM: An Edge-Computing-Oriented Forwarding Mechanism for Information-Centric Networks2020 3rd International Conference on Hot Information-Centric Networking (HotICN)10.1109/HotICN50779.2020.9350827(154-159)Online publication date: 12-Dec-2020
    • (2018)Decoupling information and connectivity via information-centric transportProceedings of the 5th ACM Conference on Information-Centric Networking10.1145/3267955.3267963(54-66)Online publication date: 21-Sep-2018
    • (2018)On Implicit Denial of Service Attack in NDN and Potential Mitigations2018 IEEE International Conference on Communications Workshops (ICC Workshops)10.1109/ICCW.2018.8403579(1-6)Online publication date: May-2018

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Login options

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media