Conference PaperPDF Available

MobilityFirst Future Internet Architecture Project

Authors:

Abstract and Figures

This short paper presents an overview of the MobilityFirst network architecture, which is a clean-slate project being conducted as part of the NSF Future Internet Architecture (FIA) program. The proposed architecture is intended to directly address the challenges of wireless access and mobility at scale, while also providing new multicast, anycast, multi-path and context-aware services needed for emerging mobile Internet application scenarios. Key protocol components of the proposed architecture are: (a) separation of naming from addressing; (b) public key based self-certifying names (called globally unique identifiers or GUIDs) for network-attached objects; (c) global name resolution service (GNRS) for dynamic name-to-address binding; (d) delay-tolerant and storage-aware routing (GSTAR) capable of dealing with wireless link quality fluctuations and disconnections; (e) hop-by-hop transport of large protocol data units; and (f) location or context-aware services. The basic operations of a MobilityFirst router are outlined. This is followed by a discussion of ongoing proof-of-concept prototyping and experimental evaluation efforts for the MobilityFirst protocol stack. In conclusion, a brief description of an ongoing multi-site experimental deployment of the MobilityFirst protocol stack on the GENI testbed is provided.
Content may be subject to copyright.
MobilityFirst Project, Proc. ACM AINTec 2011 Page: 1
MobilityFirst Future Internet Architecture Project
Ivan Seskar, Kiran Nagaraja, Sam Nelson and Dipankar Raychaudhuri
WINLAB, Rutgers University
Technology Centre of NJ, 671 Route 1
North Brunswick, NJ 08902
seskar@winlab.rutgers.edu
Abstract This short paper presents an overview of the
MobilityFirst network architecture, which is a clean-slate
project being conducted as part of the NSF Future Internet
Architecture (FIA) program. The proposed architecture is
intended to directly address the challenges of wireless access
and mobility at scale, while also providing new multicast,
anycast, multi-path and context-aware services needed for
emerging mobile Internet application scenarios. Key
protocol components of the proposed architecture are: (a)
separation of naming from addressing; (b) public key based
self-certifying names (called globally unique identifiers or
GUIDs) for network-attached objects; (c) global name
resolution service (GNRS) for dynamic name-to-address
binding; (d) delay-tolerant and storage-aware routing
(GSTAR) capable of dealing with wireless link quality
fluctuations and disconnections; (e) hop-by-hop transport of
large protocol data units ; and (f) location or context-aware
services. The basic operations of a MobilityFirst router are
outlined and a simple example of how the protocol supports
dual-homing and multi-path is given. This is followed by a
discussion of ongoing proof-of-concept prototyping and
experimental evaluation efforts for the MobilityFirst
protocol stack. In conclusion, a brief description of an
ongoing multi-site experimental deployment of the
MobilityFirst protocol stack on the GENI testbed is
provided.
Keywords- Future Internet architecture, mobile networks,
name resolution, storage-aware routing, GENI prototyping.
I. INTRODUCTION
The MobilityFirst project is founded on the premise
that the Internet is approaching an historic inflection
point, with mobile platforms and applications poised to
replace the fixed-host/server model that has dominated
the Internet since its inception. This predictable, yet
fundamental, shift presents a unique opportunity to design
a next generation Internet in which mobile devices, and
applications, and the consequent changes in service,
trustworthiness, and management are primary drivers of a
new architecture. The major design goals of our proposed
architecture are: mobility as the norm with dynamic host
and network mobility at scale; robustness with respect to
intrinsic properties of wireless medium; trustworthiness in
the form of enhanced security and privacy for both mobile
networks and wired infrastructure; usability features such
as support for context-aware pervasive mobile services,
evolvable network services, manageability and economic
viability. The design is also informed by technology
factors such as radio spectrum scarcity, wired bandwidth
abundance, continuing Moore’s law improvements to
computing, and energy constraints in mobile and sensor
devices.
The key components of the MobilityFirst network
architecture are: (1) separation of naming and addressing,
implemented via a fast global dynamic name resolution
service; (2) self-certifying public key network addresses
to support strong authentication and security; (3)
generalized delay-tolerant routing with in-network storage
for packets in transit; (4) flat-label internetwork routing
with public key addresses; (5) hop-by-hop transport
protocols operating over path segments rather than an
end-end path; (6) a separate network management plane
that provides enhanced visibility; (7) optional privacy
features for user and location data; (8) content- and
context-aware network services; and (8) an integrated
computing and storage layer at routers to support
programmability and evolution of enhanced network
services. The architecture as a whole has been designed to
be implementable with reasonable complexity, and to
offer good scalability and performance. Although the
proposed design has its “sweet spot” in large-scale mobile
networking, its innovations and benefits will be enjoyed
within the wired core as well, via enhanced security and
robustness.
This project is a collaborative effort involving Rutgers,
UMass, MIT, Duke, U Michigan, UNC, U Wisconsin, and
U Nebraska with interaction with several industrial
research partners. The project scope includes a
progression of experimental prototypes: (i) individual
validations of key protocol components such as name
service, GDTN routing and flat-label interdomain routing;
(ii) small-scale lab prototype of the architecture for
controlled experiments; and (iii) Multi-site, medium-scale
system prototype (using GENI infrastructure) for inter-
networking experiments and proof-of-concept
demonstrations. The project will conclude with a
comprehensive validation and evaluation of the
performance and usability of the architecture using both
controlled experiments and application trials with real-
world end-users. In the following sections we provide an
early view of work-in-progress aimed at design and
prototype validation of the MobilityFirst architecture.
Research supported by NSF FIA (Future Internet
Architecture) grant #CNS- 1040735
MobilityFirst Project, Proc. ACM AINTec 2011 Page: 2
II. ARCHITECTURE SUMMARY
The major design goals for the MobilityFirst architecture
include the following: seamless user and device mobility;
ad-hoc network formation and network mobility;
tolerance to bandwidth variation and disconnection;
multicast, multi-homing and multi-path support; context
and content services; high throughput and spectral
efficiency in wireless edge networks; strong security and
privacy; usability and manageability. These requirements
are achieved using the following protocol components:
1) Clean separation between identity and network
location: MobilityFirst cleanly separates human-readable
names, globally unique identifiers, and network location
information [1-5]. The name certification service (NCS)
securely binds a human-readable name to a globally
unique identifier (GUID). A global name resolution
service (GNRS) securely maps the GUID to a network
address (NA). By allowing the GUID to be a
cryptographically verifiable identifier (e.g., a public key
or hash thereof), MobilityFirst improves trustworthiness;
conversely, by cleanly separating network location
information (NA) from the identity (GUID), MobilityFirst
allows seamless mobility at scale.
2) Decentralized name certification service (NCS):
MobilityFirst decentralizes trust in name certification, i.e.,
different independent NCS organizations could attest to
the binding between a human-readable name and the
corresponding (public key) GUID. It is conceivable that
the different organizations may disagree on the GUID
corresponding to a name. End-users can choose which
NCS(es) to trust and use quorum-based techniques to
resolve disagreement between NCSs.
3) Massively scalable global name resolution
service (GNRS): The GNRS is one of the most central
components of MobilityFirst and is responsible for
supporting seamless mobility at scale. The scale we
envision is on the order of 10 billion mobile devices
moving through about 100 networks each day, which
corresponds to an update overhead of ~10 million/sec. In
comparison, DNS, by design, relies heavily on caching
and takes on the order of several days to update a record.
Thus, designing a massively scalable distributed GNRS is
a key challenge in MobilityFirst.
4) Generalized Storage Aware Routing:
MobilityFirst exploits in-network storage at routers in
order to cope with variations in wireless access network
bandwidth and occasional disconnections that inevitably
occur in real-world mobility scenarios. Earlier work on
the CNF architecture [6,7] demonstrated the benefit of
storage and outlined storage-aware routing algorithms
which consider long- and short-term path quality metrics
while making forwarding decisions. The GSTAR
protocol [8] further integrates delay tolerant networking
(DTN) capabilities with CNF-like storage routing to
provide a seamless solution for a wide range of wireless
access scenarios.
5) Content- and context-aware services: The
network layer in MobilityFirst is designed to be content-
aware, i.e., it actively assists in content retrieval as
opposed to simply providing a primitive to send packets
to specified destinations in today’s Internet. MobilityFirst
achieves this by assigning GUIDs to content. These
GUIDs are cryptographically verifiable, e.g., self-
certifying hashes of the content, which allows a receiver
to easily check the integrity of the content. MobilityFirst
also extends the basic device and content GUIDs to more
flexible groups of devices or users, e.g., all mobile
devices in Central Park; or all taxis in Times Square, etc.
6) Computing and storage layer: Experience with
the current Internet shows that it is imperative to design
for evolvability. To this end, MobilityFirst routers
explicitly support a computing and storage layer that
enable rapid introduction of new, and possibly niche,
services while minimally impacting the performance of
the large majority of existing users.
III. PROTOCOL DESIGN
Based on the considerations outlined in Sec II we have
developed an initial specification for the high-level
protocol architecture of the network.
Fig. 1 Separation of Names from Addresses in the
MobilityFirst Architecture
Globally Unique Flat Identifier (GUID)
John’s _laptop_1
Sue’s_mobile_2
Server_1234
Sensor@XYZ
Media File_ABC
Host
Naming
Service
Network
Sensor
Naming
Service
Content
Naming
Service
Global Name Resolution Service
Network address
Net1.local_ID
Net2.local_ID
Context
Naming
Service
Taxis in NB
MobilityFirst Project, Proc. ACM AINTec 2011 Page: 3
The MobilityFirst protocol architecture is based on a
clean separation of names (of network-attached objects)
from network addresses. As shown in Fig 1 above, there
are a number of application specific “name certification”
services which translate a human readable name such as
“sensor@xyz” or “John’s laptop” to a set of network
addresses corresponding to the current points of
attachment of the network object. The name service
translates the human readable name to a unique GUID
(globally unique identifier) which is used as the
authoritative identifier for network attached objects,
which may be devices, content, sensors, etc. The GUID is
also a public key, thus providing a mechanism for
authentication and management of trust for all network-
attached devices or objects. This framework also supports
the concept of context-based descriptors such as taxis in
New Brunswick which can be resolved by a context
naming service to a particular GUID which serves as a
dynamic multicast group for all taxis currently in that
area. Once a GUID has been assigned to a network
object, there is an additional mapping from GUID to
network address (NA) as shown in the figure. The idea is
to assign routable network addresses to “network ports”
and dynamically bind GUIDs to network ports using a
new distributed network service called the “global name
resolution service (GNRS)”. The GNRS supports
dynamic mobility simply by providing the current point of
attachment of the mobile device, without the need for
routing-level indirection associated with current
networking protocols such as mobile IP. The network
addresses (NAs) are expected to change at a slower time-
scale and can use a second distributed network protocol
(analogous to BGP in the Internet) for dissemination of
routing updates.
Fig. 2. Hybrid GUID/NA packet headers in MobilityFirst
Referring to Fig 2, it is observed that packets entering the
network have the destination (and source) GUID attached
to the protocol data unit (PDU). There is also a service
identifier (SID) in the packet header which indicates the
type of service required by the PDU including options
such as unicast, multicast, anycast, context delivery,
content query, etc. At the first access router, the
destination GUID is resolved by accessing the global
name resolution service (GNRS) which provides a
dynamic mapping between GUIDs and routable NAs.
The resolved NAs are optionally appended to the packet
header thus making it possible for subsequent routers
along the path to forward the PDU based on NAs alone
this is referred to as “fast path” forwarding. Any router
along the path has the option of resolving the GUID again
by querying the GNRS this is the so-called “slow path”
which allows for rebinding to a new set of NA’s that may
have resulted from mobility or temporary disconnection.
The GUID routing option makes it possible to implement
“late binding” algorithms where the decision on which
network ports to route to is deferred until the PDU is
close to the destination.
It is also noted that in the MobilityFirst architecture,
PDU’s may be large units ~100MB - ~1GB
corresponding to complete audio or video files, and these
are transferred as contiguous units from one router to the
next. Another key feature of the architecture is the
existence of in-network storage at routers. This enables
us to use storage-aware routing protocols which have the
option of temporarily storing PDUs at routers instead of
forwarding towards the destination in order to deal with
poor link quality or disconnection. A reliable hop-by-hop
transport protocol is used to deliver packets between
routers in contrast to the end-to-end approach used in
TCP/IP.
Another key feature of the proposed MobilityFirst
protocol stack is the service flexibility, with particular
emphasis on multicasting, anycasting, multi-path and
multi-homing modes as integral capabilities of the routing
protocol. These service features have been provided in
response to the needs of mobility applications which often
care more about the context (e.g. device location or
function) than its network address.
Fig. 3. Supporting Dual-Homing in MobilityFirst Routing
The GUID mechanism outlined above allows for context
and content addressability with multicasting or anycasting
to the set of network addresses associated with a GUID
(such as taxis in New Brunswick or Alice’s_laptop). A
particularly interesting use case that is difficult to handle
MobilityFirst Project, Proc. ACM AINTec 2011 Page: 4
with conventional IP is that of “dual-homing” where a
user’s laptop may have two or more wireless interfaces
(such as WiFi and 3G) on separate access networks, and
the service objective is to deliver to at least one of these
interfaces based on a suitable cost metric. An example of
how the protocol works for such a dual-homing scenario
is given in Fig. 3 above. In this example, the GUID for
“Alice’s_laptop” is resolved to two distinct network
addresses corresponding to the 3G and WiFi networks
that it is currently connected to. The PDU carries both
these network addresses and the network routing protocol
implements a “longest common path” type of algorithm
before bifurcating the same message to both destinations.
IV. MOBILITYFIRST PROTOTYPE ON GENI
An early proof-of-concept prototype of the MobilityFirst
architecture is currently under development, and was first
shown at the GENI Engineering Conference-12, Kansas
City in Nov 2011. This prototype is initially based on
modified Click modular routers with additional GNRS
and storage routing (GSTAR) functionality. The protocol
stack to be implemented is shown in Fig 4 below.
Fig 4. MobilityFirst Protocol Stack
This implementation of the protocol stack includes a hop-
by-hop reliable link protocol based on the”HOP” protocol
from UMass [9]. The GUID service layer has also been
implemented on Linux and Android mobile clients, with a
new set of service API’s which correspond to the block
delivery (both unicast and multicast), anycast and content
query services offered by the new protocol. The Click
modular router [10] implementation along with additional
modules is outlined in Fig. 5 below. A two-level
abstraction with fast-path as Click forwarding modules
and slow-path as user level services (such as control and
management) has been implemented.
Fig 5. Click Modulator Router Implementation
The experimental system prototyped and demonstrated at
GEC-12 in Kansas City consists of 7 programmable
ProtoGENI routers spread across the US with two edge
networks (located at BBN, Cambridge, MA and
WINLAB, Rutgers, North Brunswick, NJ) with both
WiMAX base stations and WiFi access points for end-
user mobile access. The network’s topology is illustrated
in Fig. 6 below.
Fig 6. GENI Proof-of-Concept Experiment Configuration
The corresponding physical topology of the GENI nodes
in the network uses a combination of different OpenFlow
switches [11] and ProtoGENI nodes located at various
sites across the US. The configuration used thus includes
realistic RTT delays between router nodes, along with a
variety of link speeds and access network techologies. In
the scenario being considered, there are two dual-homed
mobile devices in the BBN and Rutgers networks
respectively, one serving as a content server and the other
as a client. The GSTAR protocol provides features for
efficiently delivering the content from server to client in a
hop-by-hop manner with in-network storage and multi-
homing (taking advantage of both the available WiMAX
and WiFi interfaces).
MobilityFirst Project, Proc. ACM AINTec 2011 Page: 5
Fig 7. GENI Proof-of-Concept Experiment Configuration
The application demonstrated is a content delivery
scenario (see Fig 8) in which content is labeled with a
unique GUID, and then delivered in request to a
get(GUID)query from the client. The content delivery
operation involves GNRS resolution followed by GSTAR
routing of the entire protocol data unit (media file) on a
hop-by-hop basis. The experiment also demonstrates the
fact that the GSTAR protocol is capable of dealing with
edge network bandwidth variation and occasional
disconnection that normally occur in the WiMAX and
WiFi edge network. In particular, router nodes store the
delivered blocks until channel conditions improve
sufficiently for forwarding to resume along the path. The
protocol is also capable of automatically choosing one or
both available multi-homed paths in order to meet desired
service and policy objectives.
Fig 8. Content Delivery Application in GENI Experiment
V. CONCLUDING REMARKS
In this paper, we have presented an overview of the
MobilityFirst future Internet architecture currently under
development under the NSF FIA program. The design
includes several key concepts for mobility-centric
networks including separation of name and address,
global name resolution service (GNRS), generalized
storage-aware routing (GSTAR) and routing layer support
for multi-path, multicast and multi-homing. A proof-of-
concept prototype for the MobilityFirst protocol stack has
been successfully developed on the GENI experimental
testbed and demonstrated in Nov 2011. The results so far
are promising, and we expect to report more definitive
results with protocol details and performance results over
the next 1-2 years. Further work will include inter-
domain routing aspects, designs for content- and context-
aware services, management plane features, and
computing layer services.
VI. REFERENCES
[1] I. Stoica, R. Morris, D. Liben-Nowell, D. R. Karger,
M. F. Kaashoek, F. Dabek, and H. Balakrishnan. Chord: a
scalable peer-to-peer lookup protocol for Internet
applications. IEEE/ACM Trans. Networks., 11:1732,
February 2003.
[2] S. Ratnasamy, P. Francis, M. Handley, R. Karp, and S.
Shenker. A scalable content-addressable network. In
Proceedings of ACM SIGCOMM ’01, pages 161172,
2001.
[3] S. Deering, R. Hinden. Internet Protocol, Version 6
(IPv6) Specification. IETF RFC 1883, Dec. 1995.
[4] D. G. Andersen, H. Balakrishnan, N. Feamster, T.
Koponen, D. Moon, and S. Shenker. Accountable Internet
Protocol (AIP). In Proceedings of ACM SIGCOMM '08,
Aug. 2008.
[5] R. Moskowitz and P. Nikander. Host Identity Protocol
(HIP) Architecture. IETF RFC 4423, May 2006.
[6] Sanjoy Paul, Roy Yates, Dipankar Raychaudhuri, and
Jim Kurose. “The Cache-And-Forward Network
Architecture for Efficient Mobile Content Delivery
Services in the Future Internet.” Proc. of the First ITU-T
Kaleidoscope Academic Conference on Innovations in
NGN: Future Network and Services, 2008.
[7] Snehapreethi Gopinath, Shweta Jain, Shivesh
Makharia and Dipankar Raychaudhuri.“An Experimental
Study of the Cache-and-Forward Network Architecture in
Multi-hop Wireless Scenarios.” Proc. Local and
Metropolitan Area Networks (LANMAN), 2010.
[8] S. Nelson, G. Bhanage, and D. Raychaudhuri.
“GSTAR: Generalized Storage-Aware Routing for
MobilityFirst in the Future Internet Architecture.” Proc.
of ACM MobiArch Workshop, 2011.
[9] Ming Li, Devesh Agrawal, Deepak Ganesan, and
Arun Venkataramani, “Block-Switching: A New
Paradigm for Wireless Transport, USENIX NSDI 2009.
[10] Click Modular Router Project -
http://read.cs.ucla.edu/click/
[11] OpenFlow Switching Specification.
http://www.openflow.org/
... In this subsection, we review some representative ICN architectures including DONA [4], CCN [1], [7], NDN [8], PSIRP/PURSUIT [2], [9], [10], NetInf [5], and Mobility-First [11], [12]. We refer interested readers to two surveys [13], [14] for more details on other ICN architectures, such as SAIL [15], 4WARD [16], COMET [17], [18], CONVER-GENCE [19], and CONET [20]. ...
... MobilityFirst [11], [12] was funded by the NSF's future Internet Architecture program in 2010. The main focus of this architecture is to scale in the face of device mobility, hence it includes detailed mechanisms for handling mobility, wireless links, multicast, multi-homing, security, and in-network caching. ...
Preprint
Full-text available
Information-Centric Networking (ICN) is a new networking paradigm, which replaces the widely used host-centric networking paradigm in communication networks (e.g., Internet, mobile ad hoc networks) with an information-centric paradigm, which prioritizes the delivery of named content, oblivious of the contents origin. Content and client security are more intrinsic in the ICN paradigm versus the current host centric paradigm where they have been instrumented as an after thought. By design, the ICN paradigm inherently supports several security and privacy features, such as provenance and identity privacy, which are still not effectively available in the host-centric paradigm. However, given its nascency, the ICN paradigm has several open security and privacy concerns, some that existed in the old paradigm, and some new and unique. In this article, we survey the existing literature in security and privacy research sub-space in ICN. More specifically, we explore three broad areas: security threats, privacy risks, and access control enforcement mechanisms. We present the underlying principle of the existing works, discuss the drawbacks of the proposed approaches, and explore potential future research directions. In the broad area of security, we review attack scenarios, such as denial of service, cache pollution, and content poisoning. In the broad area of privacy, we discuss user privacy and anonymity, name and signature privacy, and content privacy. ICN's feature of ubiquitous caching introduces a major challenge for access control enforcement that requires special attention. In this broad area, we review existing access control mechanisms including encryption-based, attribute-based, session-based, and proxy re-encryption-based access control schemes. We conclude the survey with lessons learned and scope for future work.
... Packets are always transmitted through anchor nodes, which will lead to problems such as mobile handoff path extension, single points of failure, and so on. Anchorless proposals [19][20][21][22][23][24][25][26][27] remove the anchor nodes, thus realizing optimization of the forwarding path to a certain extent and bringing better performance to the handover. With the rise of the mobile Internet, the Internet of Things, and the industrial Internet, various mobile applications that require low latency have emerged, such as augmented reality, intelligent vision applications, and online games. ...
... MobilityFirst [26] uses a globally unique identifier (GUID) to identify the identity information of the device or data, and a network address (NA) represents the current location information of the device or content. The mapping of GUID to NA is completed through the global name-resolution system (GNRS). ...
Article
Full-text available
Information-centric networking (ICN) is a promising solution that can meet the challenges of IP-based networks. ICN adopts the solution of separating name and address to solve the dual semantics problem of IP addresses, which has natural advantages in supporting mobility. These mobility support methods in ICN have realized route optimization to a certain extent. In fact, due to these methods not considering the real-time network environment, such as the bandwidth of the switching path and the characteristics of different mobile data flows, these approaches adopt the same routing optimization solution for all data flows generated by mobile users, resulting in a single switching path. The bandwidth of a single switching path may not meet the transmission requirements of mobile data flows, which will greatly affect the performance of mobile users. Therefore, how to efficiently allocate switching paths for multiple mobile data flows generated by mobile users is an urgent problem in ICN mobility support. In this paper, we first propose a mobility support method for dynamically allocating mobile data flows (DAFM) based on the ICN mobility support architecture and model the mobile data flow allocation problem as a late-binding node selection problem. We then propose a double-constraints heuristic algorithm (DCHA) based on the Moser algorithm. By simultaneously adjusting the bandwidth resource constraints of the switching path and the space resource constraints of the Mobility Flow Table (MFT), we achieve late-binding node selection to minimize average packet delay. Finally, experimental results show that our proposal can achieve mobility support. Under the guarantee of a low-latency Name Resolution System (NRS), our method outperforms other methods in terms of average packet delay, packet loss rate, and handover delay.
... MobilityFirst (MF) [129] redesigns the network-layer using a content centric architecture and is designed to support the shift from static hosts (e.g., desktop computers using WiFi) to mobile objects (e.g., smartphones using cellular data). ...
Article
Full-text available
Recent initiatives known as Future Internet Architectures (FIAs) seek to redesign the Internet to improve performance, scalability, and security. However, some governments perceive Internet access as a threat to their political standing and engage in widespread network surveillance and censorship. In this paper, we provide an in-depth analysis of the design principles of prominent FIAs in terms of their packet structure, addressing and naming schemes, and routing protocols to foster discussion on how these new systems interact with censorship and surveillance apparatuses. Further, we assess the extent to which existing surveillance and censorship mechanisms can successfully target FIA users while discussing privacy enhancing technologies to counter these mechanisms. We conclude by providing guidelines for future research into novel FIA-based privacy-enhancing technologies, and recommendations to guide the evaluation of these technologies.
... In order to support movement of nodes and routing, IOT needs to find a way by which the network elements will be found easier than by just having connection points. Therefore, a clear and transparent structural separation between routable names and addresses is a vital requirement for IOT (28,29). Based on IPV6 address space allocation, the issue of IoT and a network of smart devices has been offered. ...
... Scalable & Adaptive Internet soLutions (SAIL), COntent Mediator architecture for content-aware nETworks (COMET) [6], and MobilityFirst [7]. Nevertheless, the most prominent realization of the ICN vision is Named Data Networking (NDN) [8]. ...
Chapter
High mobility, heterogeneous communication, and low latency are some of the challenges that Unmanned Aerial Vehicles (UAVs)-based networks must face to ensure reliable and long-distance connections. Unfortunately, the TCP/IP model partially fails to fulfill these prerequisites, as it was not designed for such types of networks. To overcome these limitations, the research community has explored alternatives to support these requirements. Several Future Internet Architectures (FIAs) were proposed. One of the most promising FIA candidates is Information-Centric Networking (ICN), which attracted a large research community since its creation. ICN adopts a content-driven networking paradigm rather than the conventional location-driven networking paradigm adopted by TCP/IP. The communication process relies on name-based routing, which means that content retrieval is independent of its source. This feature enables fast content dissemination and in-network caching. It also works as a built-in multicast mechanism. Another fundamental feature that ICN provides has to do with data security. It focuses on securing the content itself rather than communication channels. These properties position the ICN architecture as a reliable model for mobile networks in general and inter-UAV communications in particular, compared to the traditional TCP/IP architecture. In this chapter, we will provide an overview of ICN-based communication for UAVs.KeywordsUnmanned aerial vehiclesFuture internet architecturesNamed data networking
... MobilityFirst is a future internet architecture that was proposed by NSF as a part of their clean-slate project program. The initiative faces challenges such as mobile access and scalability, as detailed in [39]. The architecture is built around key components, including names from the address separation, public key-based names, delay-tolerant routing that can handle wireless link quality fluctuations, large protocol data units, and location-aware services (see Figure 6). ...
Article
Full-text available
Future Internet is a general term that is used to refer to the study of new Internet architectures that emphasize the advancements that are paving the way for the next generation of internet. Today’s internet has become more complicated and arduous to manage due to its increased traffic. This traffic is a result of the transfer of 247 billion emails, the management of more than a billion websites and 735 active top-level domains, the viewing of at least one billion YouTube videos per day (which is the source of main traffic), and the uploading of more than 2.5 billion photos to Facebook every year. The internet was never anticipated to provide quality of service (QoS) support, but one can have a best effort service that provides support for video streams and downloaded media applications. Therefore, the future architecture of the internet becomes crucial. Furthermore, the internet as a service has witnessed many evolving conflicts among its stakeholders, leading to extensive research. This article presents a systematic review of the internet’s evolution and discusses the ongoing research efforts towards new internet architectures, as well as the challenges that are faced in increasing the network’s performance and quality. Moreover, as part of these anticipated future developments, this article draws attention to the Metaverse, which combines the emerging areas of augmented reality, virtual reality, mixed reality, and extended reality, and is considered to be the next frontier for the future internet. This article examines the key role of the blockchain in organizing and advancing the applications and services within the Metaverse. It also discusses the potential benefits and challenges of future internet research. Finally, the article outlines certain directions for future internet research, particularly in the context of utilizing blockchains in the Metaverse.
Book
This book discusses the potential of the Internet of Unmanned Things (IoUT), which is considered a promising paradigm resulting in numerous applications including shipment of goods, home package delivery, crop monitoring, agricultural surveillance, and rescue operations. The authors discuss how IoUT nodes collaborate with each other in ad hoc manner through a Line-of-Sight (LoS) link to exchange data packets. Also discussed is how Unmanned Arial Vehicles (UAVs) can communicate with fixed ground stations, with an air traffic controller, or through a Non-Line-of-Sight (NLoS) link with a satellite-aided controller, generally based on preloaded missions. The authors go on to cover how to tackle issues that arise with dissimilar communication technologies. They cover how various problems can appear in inter-UAV and UAV-to-X communications including energy management, lack of security and the unreliability of wireless communication links, and handover from LoS to NLoS, and vice versa. In this book, the editors invited front-line researchers and authors to submit research exploring emerging technologies for IoUT and mission-based networking and how to overcome challenges.
Conference Paper
Full-text available
The Cache-and-Forward (CNF) protocol architecture was proposed to support efficient mobile content delivery services in the future Internet. In contrast to the TCP/IP protocol stack which is based upon the assumption of reliable end-to-end path through the network, the CNF architecture considers varying access link speed/quality and periods of disconnection as inherent properties of the network. Routers in a CNF network are built with large memory space for in-network caching and temporary storage to support transient disconnections due to mobility or link quality variation. Content delivery through the network follows a hop-by-hop transport method in which files move as single entities from one router to the next rather than as end-to-end packet streams. A novel storage aware routing protocol (STAR) is proposed to efficiently support mobile and wireless end-users through the use of a two-dimensional metric that takes into account both short-term and long-term path quality in making forwarding and storage decisions. A reliable link layer provides per hop file transfer reliability. This paper provides an outline of the three basic protocol components of CNF i.e., transport, routing and link layers and describes a proof-of-concept implementation of the protocol stack on the ORBIT testbed. Performance evaluation results in multi-hop wireless scenarios with lossy link conditions show 66% improvement in wireless network throughput compared to TCP and 60% lower packet loss rate when compared to UDP.
Conference Paper
Full-text available
This paper presents AIP (Accountable Internet Protocol), a network architecture that provides accountability as a first-order property. AIP uses a hierarchy of self-certifying addresses, in which each component is derived from the public key of the corresponding entity. We discuss how AIP enables simple solutions to source spoofing, denial-of-service, route hijacking, and route forgery. We also discuss how AIP's design meets the challenges of scaling, key management, and traffic engineering.
Conference Paper
The Internet is at a historic inflection point where mobile, wireless devices are becoming so dominant that core architectural changes are necessary to efficiently support them. This paper presents the high-level concepts and design decisions used to realize the key routing component of the MobilityFirst architecture, which is a clean-slate project being conducted as part of the NSF Future Internet Architecture program. In particular, we describe GSTAR, a mobilitycentric generalized storage-aware routing approach based on the following key design principles: separation of names from addresses, late binding of routable addresses, in-network storage, and conditional routing decision space. The GSTAR protocol described is based on hop-by-hop forwarding of large protocol data units (PDUs) between routers with storage. The packet header incorporates both name and address information enabling routers to execute a hybrid forwarding algorithm that uses topological addresses when available and refers back to names (i.e. global identifiers) to deal with dynamically changing points of attachment and disconnection. At a local level, GSTAR utilizes both fine-grain path quality information and DTN-style connectivity information to deal with the many challenges found in mobile environments.
Article
The Internet is at a historic inflection point where mobile, wireless devices are becoming so dominant that core archi-tectural changes are necessary to efficiently support them. This paper presents the high-level concepts and design deci-sions used to realize the key routing component of the Mo-bilityFirst architecture, which is a clean-slate project being conducted as part of the NSF Future Internet Architecture program. In particular, we describe GSTAR, a mobility-centric generalized storage-aware routing approach based on the following key design principles: separation of names from addresses, late binding of routable addresses, in-network storage, and conditional routing decision space. The GSTAR protocol described is based on hop-by-hop forwarding of large protocol data units (PDUs) between routers with stor-age. The packet header incorporates both name and address information enabling routers to execute a hybrid forwarding algorithm that uses topological addresses when available and refers back to names (i.e. global identifiers) to deal with dy-namically changing points of attachment and disconnection. At a local level, GSTAR utilizes both fine-grain path quality information and DTN-style connectivity information to deal with the many challenges found in mobile environments.
Article
A fundamental problem that confronts peer-to-peer applications is the efficient location of the node that stores a desired data item. This paper presents Chord, a distributed lookup protocol that addresses this problem. Chord provides support for just one operation: given a key, it maps the key onto a node. Data location can be easily implemented on top of Chord by associating a key with each data item, and storing the key/data pair at the node to which the key maps. Chord adapts efficiently as nodes join and leave the system, and can answer queries even if the system is continuously changing. Results from theoretical analysis and simulations show that Chord is scalable: Communication cost and the state maintained by each node scale logarithmically with the number of Chord nodes.
Conference Paper
TCP has well-known problems over multi-hop wireless networks as it conflates congestion and loss, performs poorly over time-varying and lossy links, and is fragile in the presence of route changes and disconnections. Our contribution is a clean-slate design and implemen- tation of a wireless transport protocol, Hop, that uses re- liable per-hop block transfer as a building block. Hop is 1) fast, because it eliminates many sources of overhead as well as noisy end-to-end rate control, 2) robust to par- titions and route changes because of hop-by-hop control as well as in-network caching, and 3) simple, because it obviates complex end-to-end rate control as well as com- plex interactions between the transport and link layers. Our experiments over a 20-node multi-hop mesh network show that Hop is dramatically more efficient, achieving better fairness, throughput, delay, and robustness to par- titions over several alternate protocols, including gains of more than an order of magnitude in median throughput.