This brief paper offers a perspective on the subject of names of destinations in data communication networks. It suggests two ideas: First, it is helpful to distinguish among four different kinds of objects that may be named as the destination of a packet in a network. Second, the operating system concept of binding is a useful way to describe the relations among the four kinds of objects. To illustrate the usefulness of this approach, the paper interprets some more subtle and confusing properties of two real-world network systems for naming destinations.
RFC Downloads
Cited By
- Pappas C, Lee T, Reischuk R, Szalachowski P and Perrig A (2019). Network Transparency for Better Internet Security, IEEE/ACM Transactions on Networking, 27:5, (2028-2042), Online publication date: 1-Oct-2019.
- Coras F, Domingo-Pascual J, Lewis D and Cabellos-Aparicio A (2016). An analytical model for Loc/ID mappings caches, IEEE/ACM Transactions on Networking, 24:1, (506-516), Online publication date: 1-Feb-2016.
- Gao Z, Venkataramani A, Kurose J and Heimlicher S (2014). Towards a quantitative comparison of location-independent network architectures, ACM SIGCOMM Computer Communication Review, 44:4, (259-270), Online publication date: 25-Feb-2015.
- Jung H Future internet issues from the perspective of a generic network model Proceedings of The Ninth International Conference on Future Internet Technologies, (1-2)
- Gao Z, Venkataramani A, Kurose J and Heimlicher S Towards a quantitative comparison of location-independent network architectures Proceedings of the 2014 ACM conference on SIGCOMM, (259-270)
- Kim J, Iannone L and Feldmann A (2013). Caching Locator/ID mappings, Computer Networks: The International Journal of Computer and Telecommunications Networking, 57:4, (897-909), Online publication date: 1-Mar-2013.
- Jung H Considerations on the endpoint for future internet Proceedings of the 7th International Conference on Future Internet Technologies, (43-44)
- Partridge C (2011). Forty data communications research questions, ACM SIGCOMM Computer Communication Review, 41:5, (24-35), Online publication date: 22-Oct-2011.
- Gomez-Skarmeta A, Martinez-Julia P, Girao J and Sarma A Identity based architecture for secure communication in future internet Proceedings of the 6th ACM workshop on Digital identity management, (45-48)
- Quoitin B, Iannone L, de Launois C and Bonaventure O Evaluating the benefits of the locator/identifier separation Proceedings of 2nd ACM/IEEE international workshop on Mobility in the evolving internet architecture, (1-6)
- Rousseau F, Grunenberger Y, Untz V, Schiller E, Starzetz P, Theoleyre F, Heusse M, Alphand O and Duda A An architecture for seamless mobility in spontaneous wireless mesh networks Proceedings of 2nd ACM/IEEE international workshop on Mobility in the evolving internet architecture, (1-8)
- Wong W, Verdi F and Magalhães M A next generation internet architecture for mobility and multi-homing support Proceedings of the 2007 ACM CoNEXT conference, (1-2)
- Iannone L and Bonaventure O On the cost of caching locator/ID mappings Proceedings of the 2007 ACM CoNEXT conference, (1-12)
- Atkinson R, Bhatti S and Hailes S A proposal for unifying mobility with multi-homing, NAT, & security Proceedings of the 5th ACM international workshop on Mobility management and wireless access, (74-83)
- Caesar M, Condie T, Kannan J, Lakshminarayanan K, Stoica I and Shenker S ROFL Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications, (363-374)
- Caesar M, Condie T, Kannan J, Lakshminarayanan K, Stoica I and Shenker S (2006). ROFL, ACM SIGCOMM Computer Communication Review, 36:4, (363-374), Online publication date: 11-Aug-2006.
- Ahlgren B, Eggert L, Ohlman B, Rajahalme J and Schieder A Names, addresses and identities in ambient networks Proceedings of the 1st ACM workshop on Dynamic interconnection of networks, (33-37)
- Walfish M, Stribling J, Krohn M, Balakrishnan H, Morris R and Shenker S Middleboxes no longer considered harmful Proceedings of the 6th conference on Symposium on Operating Systems Design & Implementation - Volume 6, (15-15)
- Balakrishnan H, Lakshminarayanan K, Ratnasamy S, Shenker S, Stoica I and Walfish M (2004). A layered naming architecture for the internet, ACM SIGCOMM Computer Communication Review, 34:4, (343-352), Online publication date: 30-Aug-2004.
- Balakrishnan H, Lakshminarayanan K, Ratnasamy S, Shenker S, Stoica I and Walfish M A layered naming architecture for the internet Proceedings of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications, (343-352)
- Clark D, Braden R, Falk A and Pingali V (2003). FARA, ACM SIGCOMM Computer Communication Review, 33:4, (313-321), Online publication date: 1-Oct-2003.
- Clark D, Braden R, Falk A and Pingali V FARA Proceedings of the ACM SIGCOMM workshop on Future directions in network architecture, (313-321)
- Francis P and Gummadi R (2001). IPNL, ACM SIGCOMM Computer Communication Review, 31:4, (69-80), Online publication date: 1-Oct-2001.
- Francis P and Gummadi R IPNL Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications, (69-80)
Recommendations
Routing to Multi-instantiated Destinations: Principles and Applications
ICNP '14: Proceedings of the 2014 IEEE 22nd International Conference on Network ProtocolsPrior solutions for routing to multi-instantiated destinations (e.g., Internet multicasting and any casting, and routing in information centric networks) simply adapt existing routing algorithms designed for single-instance destinations, or rely on ...
On naming considerations for networks
The basic step involved in communication across a network and inter-network is the identification and validation of entities. Normally the identification of the entity in a network takes the form of a name or an address. The naming convention and its ...
A model for naming, addressing and routing
Naming and addressing are areas in which there is still a need for clarification. Many definitions for names, addresses, and routes have been proposed, but the exact relations among these concepts are obscure. A taxonomy of names, addresses, and routes ...