skip to main content
RFC1498: On the Naming and Binding of Network Destinations1993 RFC
Publisher:
  • RFC Editor
  • United States
Published:01 August 1993
Reflects downloads up to 05 Jan 2025Bibliometrics
Skip Abstract Section
Abstract

This brief paper offers a perspective on the subject of names of destinations in data communication networks. It suggests two ideas: First, it is helpful to distinguish among four different kinds of objects that may be named as the destination of a packet in a network. Second, the operating system concept of binding is a useful way to describe the relations among the four kinds of objects. To illustrate the usefulness of this approach, the paper interprets some more subtle and confusing properties of two real-world network systems for naming destinations.

RFC Downloads

Cited By

  1. Pappas C, Lee T, Reischuk R, Szalachowski P and Perrig A (2019). Network Transparency for Better Internet Security, IEEE/ACM Transactions on Networking, 27:5, (2028-2042), Online publication date: 1-Oct-2019.
  2. Coras F, Domingo-Pascual J, Lewis D and Cabellos-Aparicio A (2016). An analytical model for Loc/ID mappings caches, IEEE/ACM Transactions on Networking, 24:1, (506-516), Online publication date: 1-Feb-2016.
  3. ACM
    Gao Z, Venkataramani A, Kurose J and Heimlicher S (2014). Towards a quantitative comparison of location-independent network architectures, ACM SIGCOMM Computer Communication Review, 44:4, (259-270), Online publication date: 25-Feb-2015.
  4. ACM
    Jung H Future internet issues from the perspective of a generic network model Proceedings of The Ninth International Conference on Future Internet Technologies, (1-2)
  5. ACM
    Gao Z, Venkataramani A, Kurose J and Heimlicher S Towards a quantitative comparison of location-independent network architectures Proceedings of the 2014 ACM conference on SIGCOMM, (259-270)
  6. Kim J, Iannone L and Feldmann A (2013). Caching Locator/ID mappings, Computer Networks: The International Journal of Computer and Telecommunications Networking, 57:4, (897-909), Online publication date: 1-Mar-2013.
  7. ACM
    Jung H Considerations on the endpoint for future internet Proceedings of the 7th International Conference on Future Internet Technologies, (43-44)
  8. ACM
    Partridge C (2011). Forty data communications research questions, ACM SIGCOMM Computer Communication Review, 41:5, (24-35), Online publication date: 22-Oct-2011.
  9. ACM
    Gomez-Skarmeta A, Martinez-Julia P, Girao J and Sarma A Identity based architecture for secure communication in future internet Proceedings of the 6th ACM workshop on Digital identity management, (45-48)
  10. ACM
    Quoitin B, Iannone L, de Launois C and Bonaventure O Evaluating the benefits of the locator/identifier separation Proceedings of 2nd ACM/IEEE international workshop on Mobility in the evolving internet architecture, (1-6)
  11. ACM
    Rousseau F, Grunenberger Y, Untz V, Schiller E, Starzetz P, Theoleyre F, Heusse M, Alphand O and Duda A An architecture for seamless mobility in spontaneous wireless mesh networks Proceedings of 2nd ACM/IEEE international workshop on Mobility in the evolving internet architecture, (1-8)
  12. ACM
    Wong W, Verdi F and Magalhães M A next generation internet architecture for mobility and multi-homing support Proceedings of the 2007 ACM CoNEXT conference, (1-2)
  13. ACM
    Iannone L and Bonaventure O On the cost of caching locator/ID mappings Proceedings of the 2007 ACM CoNEXT conference, (1-12)
  14. ACM
    Atkinson R, Bhatti S and Hailes S A proposal for unifying mobility with multi-homing, NAT, & security Proceedings of the 5th ACM international workshop on Mobility management and wireless access, (74-83)
  15. ACM
    Caesar M, Condie T, Kannan J, Lakshminarayanan K, Stoica I and Shenker S ROFL Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications, (363-374)
  16. ACM
    Caesar M, Condie T, Kannan J, Lakshminarayanan K, Stoica I and Shenker S (2006). ROFL, ACM SIGCOMM Computer Communication Review, 36:4, (363-374), Online publication date: 11-Aug-2006.
  17. ACM
    Ahlgren B, Eggert L, Ohlman B, Rajahalme J and Schieder A Names, addresses and identities in ambient networks Proceedings of the 1st ACM workshop on Dynamic interconnection of networks, (33-37)
  18. Walfish M, Stribling J, Krohn M, Balakrishnan H, Morris R and Shenker S Middleboxes no longer considered harmful Proceedings of the 6th conference on Symposium on Operating Systems Design & Implementation - Volume 6, (15-15)
  19. ACM
    Balakrishnan H, Lakshminarayanan K, Ratnasamy S, Shenker S, Stoica I and Walfish M (2004). A layered naming architecture for the internet, ACM SIGCOMM Computer Communication Review, 34:4, (343-352), Online publication date: 30-Aug-2004.
  20. ACM
    Balakrishnan H, Lakshminarayanan K, Ratnasamy S, Shenker S, Stoica I and Walfish M A layered naming architecture for the internet Proceedings of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications, (343-352)
  21. ACM
    Clark D, Braden R, Falk A and Pingali V (2003). FARA, ACM SIGCOMM Computer Communication Review, 33:4, (313-321), Online publication date: 1-Oct-2003.
  22. ACM
    Clark D, Braden R, Falk A and Pingali V FARA Proceedings of the ACM SIGCOMM workshop on Future directions in network architecture, (313-321)
  23. ACM
    Francis P and Gummadi R (2001). IPNL, ACM SIGCOMM Computer Communication Review, 31:4, (69-80), Online publication date: 1-Oct-2001.
  24. ACM
    Francis P and Gummadi R IPNL Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications, (69-80)
Contributors
  • Massachusetts Institute of Technology

Recommendations