Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
SHARED PENDING INTEREST TABLE IN A CONTENT CENTRIC NETWORK
Document Type and Number:
WIPO Patent Application WO/2017/176993
Kind Code:
A1
Abstract:
One embodiment provides a pending interest table (PIT) sharing system that facilitates sharing of a PIT. During operation, the system receives, by a local interface, a first message comprising an interest from a node of origin. The hop count for the interest has not been decreased. The system creates an entry, which includes a name of the interest, in a PIT for the interest. If the system receives a content object associated with the name, the system retrieves and removes the entry from the PIT, and sends the content object to the node of origin in a second message.

Inventors:
FOX KEVIN C (US)
SCOTT GLENN C (US)
Application Number:
PCT/US2017/026346
Publication Date:
October 12, 2017
Filing Date:
April 06, 2017
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
CISCO TECH INC (US)
International Classes:
H04L29/08
Foreign References:
US20140289325A12014-09-25
US20150341373A12015-11-26
EP2533495A22012-12-12
US201313847814A2013-03-20
US33817508A2008-12-18
Other References:
SAXENA DIVYA ET AL: "Named Data Networking: A survey", 21 February 2016, COMPUTER SCIENCE REVIEW, ELSEVIER, AMSTERDAM, NL, PAGE(S) 15 - 55, ISSN: 1574-0137, XP029469974
Attorney, Agent or Firm:
FLOAM, D. Andrew (US)
Download PDF:
Claims:
What Is Claimed Is;

1. A computer-implemented method, comprising:

receiving, by a local interface, a first message comprising an interest from a node of origin, wherein a hop count for the interest has not been decreased;

creating an entry in a pending interest table (PIT) for the interest, wherein the entry comprises a name of the interest; and

in response to receiving a content object associated with the name,

retrieving and removing the entry from the PIT; and

sending the content object to the node of origin in a second message.

2. The method of claim 1 , wherein the name of the interest is based on one or more of:

a hierarchically structured variable-length identifier (HSVLI), which comprises contiguous name components ordered from a most general level to a most specific level, wherein the HSVLI is applicable in a portal instance corresponding to the stack;

a flat name that does not indicate any hierarchy;

a role of the component of the stack; and

a unique identifier, which is specific to the component of the stack.

3. The method of claim 1 or 2, wherein the first and second messages further comprise an interface of origin indicating an interface via which the node of origin has received the interest; and

wherein the entry further comprises an identifier of the interface of origin.

4. The method of claim 3, wherein the PIT is a proxy PIT dedicated for interests from the node of origin, and wherein the proxy PIT is distinct from a local PIT for interests from a locally coupled device. 5. The method of claim 3 or 4, wherein the entry further comprises an identifier of a tunnel interface of a tunnel coupling the node of origin.

6. The method of any of claims 1 to 5, wherein the first and second messages are tunnel-encapsulated messages, and wherein a respective interface of origin is associated with an individual tunnel.

7. The method of any of claims 1 to 6, wherein the interest from the node of origin is distinguished from interests from a locally coupled device based on distinct namespaces.

8. A non-transitory computer-readable storage medium storing instructions that when executed by a computer cause the computer to perform a method, the method comprising: receiving, by a local interface, a first message comprising an interest from a node of origin, wherein a hop count for the interest has not been decreased;

creating an entry in a pending interest table (PIT) for the interest, wherein the entry comprises a name of the interest; and

in response to receiving a content object associated with the name,

retrieving and removing the entry from the PIT; and

sending the content object to the node of origin in a second message.

9. The storage medium of claim 8, wherein the name of the interest is based on one or more of:

a hierarchically structured variable-length identifier (HSVLI), which comprises contiguous name components ordered from a most general level to a most specific level, wherein the HSVLI is applicable in a portal instance corresponding to the stack;

a flat name that does not indicate any hierarchy;

a role of the component of the stack; and

a unique identifier, which is specific to the component of the stack.

10. The storage medium of claim 8 or 9, wherein the first and second messages further comprise an interface of origin indicating an interface via which the node of origin has received the interest; and

wherein the entry further comprises an identifier of the interface of origin.

11. The storage medium of claim 10, wherein the PIT is a proxy PIT dedicated for interests from the node of origin, and wherein the proxy PIT is distinct from a local PIT for interests from a locally coupled device.

12. The storage medium of claim 10 or 11, wherein the entry further comprises an identifier of a tunnel interface of a tunnel coupling the node of origin.

13. The storage medium of any of claims 8 to 12, wherein the first and second messages are tunnel-encapsulated messages, and wherein a respective interface of origin is associated with an individual tunnel.

14. The storage medium of any of claims 8 to 13, wherein the interest from the node of origin is distinguished from interests from a locally coupled device based on distinct namespaces.

15. A computer system for facilitating forwarding of packets, the system comprising: a processor; and

a storage device storing instructions that when executed by the processor cause the processor to perform a method, the method comprising:

receiving, by a local interface, a first message comprising an interest from a node of origin, wherein a hop count for the interest has not been decreased;

creating an entry in a pending interest table (PIT) for the interest, wherein the entry comprises a name of the interest; and

in response to receiving a content object associated with the name,

retrieving and removing the entry from the PIT; and

sending the content object to the node of origin in a second message.

16. The computer system of claim 15, wherein a name of the interest is based on one or more of:

a hierarchically structured variable-length identifier (HSVLI), which comprises contiguous name components ordered from a most general level to a most specific level, wherein the HSVLI is applicable in a portal instance corresponding to the stack;

a flat name that does not indicate any hierarchy;

a role of the component of the stack; and

a unique identifier, which is specific to the component of the stack.

17. The computer system of claim 15 or 16, wherein the first and second messages further comprise an interface of origin indicating an interface via which the node of origin has received the interest; and

wherein the entry further comprises an identifier of the interface of origin.

18. The computer system of claim 17, wherein the PIT is a proxy PIT dedicated for interests from the node of origin, and wherein the proxy PIT is distinct from a local PIT for interests from a locally coupled device.

19. The computer system of claim 17 or 18, wherein the entry further comprises an identifier of a tunnel interface of a tunnel coupling the node of origin.

20. The computer system of any of claims 15 to 19, wherein the interest from the node of origin is distinguished from interests from a locally coupled device based on distinct namespaces.

21. Apparatus comprising:

means for receiving, by a local interface, a first message comprising an interest from a node of origin, wherein a hop count for the interest has not been decreased;

means for creating an entry in a pending interest table (PIT) for the interest, wherein the entry comprises a name of the interest; and

in response to receiving a content object associated with the name,

means for retrieving and removing the entry from the PIT; and

means for sending the content object to the node of origin in a second message.

22. The apparatus according to claim 21 further comprising means for implementing the method according to any of claims 2 to 7. 23. A computer program, computer program product or logic encoded on a tangible computer readable medium comprising instructions for implementing the method according to any one of claims 1 to 7.

Description:
SHARED PENDING INTEREST TABLE IN A CONTENT CENTRIC NETWORK

Inventors: Kevin C. Fox and Glenn C. Scott

RELATED APPLICATIONS

[0001] The subject matter of this application is related to the subject matter in the following applications:

U.S. Patent Application No. 13/847,814 (Attorney Docket No. PARC -20120537- US-NP), entitled "ORDERED-ELEMENT NAMING FOR NAME-BASED PACKET FORWARDING," by inventor Ignacio Solis, filed 20 March 2013 (hereinafter "U.S. Pat. App. No. 13/847,814");

U.S. Patent Application No. 12/338,175 (Attorney Docket No. PARC -20080626-

US-NP), entitled "CONTROLLING THE SPREAD OF INTERESTS AND CONTENT IN A CONTENT CENTRIC NETWORK," by inventors Van L. Jacobson and Diana K. Smetters, filed 18 December 2008 (hereinafter "U.S. Pat. App. No. 12/338,175"); and U.S. Patent Application No. 14/595,060 (Attorney Docket No. PARC- 20141111US01), entitled "AUTO-CONFIGURABLE TRANSPORT STACK," by inventors Ignacio Solis and Glenn C. Scott, filed 12 January 2015 (hereinafter "U.S. Pat. App. No. 14/595,060"); the disclosures of which are herein incorporated by reference in their entirety. BACKGROUND

Field

[0002] This disclosure is generally related to the distribution of digital content. More specifically, this disclosure is related to a shared and distributed pending interest table in a content-centric network.

Related Art

[0003] The proliferation of the Internet and e-commerce continues to create a vast amount of digital content. Content-centric network (CCN) architectures have been designed to facilitate accessing and processing such digital content. A CCN includes entities, or nodes, such as network clients, forwarders (e.g., routers), and content producers, which communicate with each other by sending "interest" packets for various content items and receiving "content object" packets in return. CCN interests and content objects are identified by their unique names, which are typically hierarchically structured variable-length identifiers (HSVLI). An HSVLI can include contiguous name components ordered from a most general level to a most specific level.

[0004] A CCN node stores an interest in an entry in a pending interest table (PIT), which includes the name and a receiving interface associated with the interest. When the node receives the corresponding content object, the node consumes (i.e., retrieves and removes) the PIT entry and forwards the content object via the interface specified in the PIT entry.

[0005] The node can have limited resources (e.g., limited amount of memory) to store its PIT. If the node forwards a large volume of data flow, the node can receive a large number of interests for content objects. As a result, the node's PIT can quickly become full (i.e., the memory available for the PIT is occupied and a new interest cannot be incorporated). The node typically does not accept interests if the local PIT is full. As a result, the node drops any subsequent interests.

SUMMARY

[0006] Aspects of the invention are set out in the independent claims and preferred features are set out in the dependent claims. Features of one aspect may be applied to each aspect alone or in combination with other aspects.

[0007] One embodiment provides a pending interest table (PIT) sharing system that facilitates sharing of a PIT. During operation, the system receives, by a local interface, a first message comprising an interest from a node of origin. The hop count for the interest has not been decreased. The system creates an entry, which includes a name of the interest, in a PIT for the interest. If the system receives a content object associated with the name, the system retrieves and removes the entry from the PIT, and sends the content object to the node of origin in a second message.

[0008] In a variation on this embodiment, the name of the interest is based on one or more of: a hierarchically structured variable-length identifier (HSVLI), which comprises contiguous name components ordered from a most general level to a most specific level. The HSVLI is applicable in a portal instance corresponding to the stack; a flat name that does not indicate any hierarchy; a role of the component within the stack; and a unique identifier, which is specific to the component of the stack. [0009] In a variation on this embodiment, the first and second messages also include an interface of origin indicating an interface via which the node of origin has received the interest. The entry then further includes an identifier of the interface of origin.

[0010] In a further variation, the PIT is a proxy PIT dedicated for interests from the node of origin. The proxy PIT is distinct from a local PIT for interests from a locally coupled device.

[0011] In a further variation, the entry also includes an identifier of a tunnel interface of a tunnel coupling the node of origin.

[0012] In a variation on this embodiment, the first and second messages are tunnel- encapsulated messages. A respective interface of origin is associated with an individual tunnel.

[0013] In a variation on this embodiment, the interest from the node of origin is distinguished from interests from a locally coupled device based on distinct namespaces.

[0014] Methods of operation of the systems described herein and apparatus for implementing the systems described herein, including network nodes, computer programs, computer program products, computer readable media and logic encoded on tangible media for implementing the methods are also described.

BRIEF DESCRIPTION OF THE FIGURES

[0015] FIG. 1 illustrates an exemplary content-centric network (CCN) that facilitates a shared PIT, in accordance with an embodiment of the present invention.

[0016] FIG. 2A illustrates an exemplary PIT sharing based on a proxy PIT, in accordance with an embodiment of the present invention.

[0017] FIG. 2B illustrates an exemplary PIT sharing based on a proxy interface mapping, in accordance with an embodiment of the present invention.

[0018] FIG. 2C illustrates an exemplary PIT sharing based on a tunnel mapping, in accordance with an embodiment of the present invention.

[0019] FIG. 3 presents a flow chart illustrating a method for offloading an interest to a proxy node, in accordance with an embodiment of the present invention.

[0020] FIG. 4A presents a flow chart illustrating a method of a proxy node sharing a PIT based on a proxy PIT, in accordance with an embodiment of the present invention.

[0021] FIG. 4B presents a flow chart illustrating a method of a proxy node sharing a PIT based on a proxy interface mapping, in accordance with an embodiment of the present invention. [0022] FIG. 4C presents a flow chart illustrating a method of a proxy node sharing a PIT based on a tunnel mapping at a node of origin, in accordance with an embodiment of the present invention.

[0023] FIG. 5A presents a flow chart illustrating a method for forwarding a content object based on PIT sharing, in accordance with an embodiment of the present invention.

[0024] FIG. 5B presents a flow chart illustrating a method for forwarding a content object based on PIT sharing and a tunnel mapping, in accordance with an embodiment of the present invention.

[0025] FIG. 6 illustrates an exemplary apparatus that facilitates PIT sharing, in accordance with an embodiment of the present invention.

[0026] FIG. 7 illustrates an exemplary computer system that facilitates PIT sharing, in accordance with an embodiment of the present invention.

[0027] In the figures, like reference numerals refer to the same figure elements. DETAILED DESCRIPTION

[0028] The following description is presented to enable any person skilled in the art to make and use the embodiments, and is provided in the context of a particular application and its requirements. Various modifications to the disclosed embodiments will be readily apparent to those skilled in the art, and the general principles defined herein may be applied to other embodiments and applications without departing from the spirit and scope of the present disclosure. Thus, the present invention is not limited to the embodiments shown, but is to be accorded the widest scope consistent with the principles and features disclosed herein.

Overview

[0029] Embodiments of the present invention solve the problem of extending a pending interest table (PIT) by sharing the PIT with a proxy node. With existing technologies, when a CCN node receives a large number of interests, its PIT can become full. As a result, the node drops any subsequent interest until a content object returns. To solve this problem, the node can offload some of the PIT entries to another node, which can be referred to as a proxy node. The proxy node maintains a set of proxy PIT entries for the node (i.e., the node of origin). When the proxy node receives the content object for an interest with a proxy PIT entry, the proxy node forwards the content object to the node. [0030] In some embodiments, the node establishes a tunnel with the proxy node. Upon receiving an interest, the node determines whether the interest should be in a local PIT entry or a proxy PIT entry. The node can allocate different namespace for local and proxy PIT entries. For example, the node can determine that any interest with a prefix "/a/b/" should be in a local PIT entry and any interest with a prefix "/pi/" should be in a proxy PIT entry. Upon determining an interest to be a candidate for a proxy PIT entry, the node sends the interest and an interface of origin (i.e., the interface via which the node has received the interest) to the proxy node via the tunnel. The proxy node then creates a proxy PIT entry (e.g., either in a different proxy PIT or in its local PIT) comprising the name of the interest and the interface of origin. The proxy node then forwards the interest.

[0031] When the proxy node receives the content object for the interest, the proxy node retrieves and removes the proxy PIT entry, and sends the content object and the interface of origin back to the node via the tunnel. The node receives the content object and the interface of origin, and forwards the content object via the interface of origin. In this way, the node shares PIT entries with the proxy node, thereby extending the capacity of its PIT. It should be noted that forwarding information via a tunnel includes encapsulating the information in a tunnel encapsulation.

[0032] In some embodiments, a PIT operates under the CCN architecture. In CCN, each piece of content is individually named, and each piece of data is bound to a unique name that distinguishes the data from any other piece of data, such as other versions of the same data or data from other sources. This unique name allows a network device to request the data by disseminating a request or an interest that indicates the unique name, and can obtain the data independent from the data's storage location, network location, application, and means of transportation. The following terms are used to describe the CCN architecture:

Content Object (or "content object"): A single piece of named data, which is bound to a unique name. Content Objects are "persistent," which means that a Content Object can move around within a computing device, or across different computing devices, but does not change. If any component of the Content Object changes, the entity that made the change creates a new Content Object that includes the updated content, and binds the new Content Object to a new unique name.

Unique Names: A name in a CCN is typically location-independent and uniquely identifies a Content Object. A data-forwarding device can use the name or name prefix to forward a packet toward a network node that generates or stores the Content Object, regardless of a network address or physical location for the Content Object. In some embodiments, the name may be a hierarchically structured variable-length identifier (HSVLI). The HSVLI can be divided into several hierarchical components, which can be structured in various ways. For example, the individual name components pare, home, ccn, and test.txt can be structured in a left-oriented prefix-major fashion to form the name "/parc/home/ccn/test.txt." Thus, the name

"/parc/home/ccn" can be a "parent" or "prefix" of "/parc/home/ccn/test.txt." Additional components can be used to distinguish among different versions of the content item, such as a collaborative document.

[0033] In some embodiments, the name can include an identifier, such as a hash value that is derived from the Content Object's data (e.g., a checksum value) and/or from elements of the Content Object's name. A description of a hash-based name is described in U.S. Patent Application No. 13/847,814, which is herein incorporated by reference. A name can also be a flat label. Hereinafter, "name" is used to refer to any name for a piece of data in a name-data network, such as a hierarchical name or name prefix, a flat name, a fixed-length name, an arbitrary-length name, or a label (e.g., a Multiprotocol Label Switching (MPLS) label).

Interest (or "interest"): A packet that indicates a request for a piece of data, and includes a name (or a name prefix) for the piece of data. A data consumer can disseminate a request or Interest across an information-centric network, which CCN/NDN routers can propagate toward a storage device (e.g., a cache server) or a data producer that can provide the requested data to satisfy the request or Interest.

[0034] In addition, "lci" and "cenx" refer to labeled content information and indicate a Universal Resource Indicator (URI) compliant identifier in which name segments carry a label. Network protocols such as CCN can use labeled content information by applying specific labels to each name segment of a URI. In a hierarchically structured name, a labeled content name assigns a semantic type or label to each segment. For example, a type of name segment can include a name segment, which is a generic name segment that includes arbitrary octets, which allows a CCN to use a binary on-the-wire representation for messages.

[0035] The methods disclosed herein are not limited to CCN networks and are applicable to other architectures as well. A description of a CCN architecture is described in U.S. Pat. App. No. 12/338,175, which is herein incorporated by reference. Exemplary Network and Communication

[0036] FIG. 1 A illustrates an exemplary content-centric network (CCN) that facilitates a shared PIT, in accordance with an embodiment of the present invention. A network 100, which can be a CCN, can include client devices 116 and 120, a content-producing device 118, and a router or other forwarding device at nodes 102, 104, 106, 108, 110, 112, and 114. A node can be a computer system, an endpoint representing users, and/or a device that can generate interests or originate content. In a CCN network, the interfaces (e.g., on a transport link adapter) are often configured based on configuration files comprising prepared configuration specifications. The configuration of these interfaces is usually modified by explicit administrative commands at runtime. Suppose that peer nodes 102 and 114 are coupled to each other via interface 142 of node 102 and interface 144 of node 114. Devices 116 and 120 are coupled with nodes 102 and 114 via interfaces 146 and 148, respectively.

[0037] With existing technologies, when node 102 receives a large number of interests, its PIT can become full. As a result, node 102 drops any subsequent interest from device 116 until a content object returns. To solve this problem, node 102 can offload some of the PIT entries to a proxy node 114. Node 114 maintains a set of proxy PIT entries for node 102. In some embodiments, node 102 establishes a tunnel 140 with node 114 between interfaces 142 and 144. Upon receiving an interest 132 from device 116 via interface 146, node 102 determines whether the interest should be in a local PIT entry or a proxy PIT entry. Node 102 can allocate different namespaces 152 and 154 for local and proxy PIT entries, respectively. For example, the node can allocate namespace 152 as prefix "/a/b/" and namespace 154 as prefix "/pi/." Namespace 154 can be referred to as a proxy namespace.

[0038] Suppose that interest 132 is for a content object identified by a name "/pl/ql," which is in namespace 154. As a result, node 102 determines interest 132 to be a candidate for a proxy PIT entry. Node 102 then includes interest 132 and an interface of origin 134 in a message 130, which can be a tunnel message (i.e., a message encapsulated in a tunneling protocol) and sends message 130 via tunnel 140. Message 130 can be referred to as a proxy message. In some embodiments, interface of origin 134 can be an identifier of interface 146. Node 114 receives message 130 and obtains interest 132 and interface of origin 134 by decapsulating message 130. Node 114 creates a proxy PIT entry (e.g., either in a different proxy PIT or in its local PIT) comprising name "/pl/ql" and the identifier of interface 146. The proxy node then forwards interest 132 in network 100. [0039] Suppose that device 118 is the producer of the content obj ect. When device 1 18 receives interest 132, device 118 sends the content object associated with name "/pl/ql" to node 114. Node 1 14 receives the content object, and retrieves and removes the proxy PIT entry associated with name "/pl/ql ." Node 114 includes the content object and interface of origin 134 in a message 136, which can be an encapsulated message that can be forwarded via a tunnel, and sends message 136 via tunnel 140 to node 102. Node 102 receives message 136, and obtains the content object and interface of origin 134 by decapsulating message 136. Since interface of origin 134 is an identifier of interface 146, node 102 forwards the content object via interface 146 to device 116. In this way, node 102 shares PIT entries with proxy node 1 14, thereby extending the capacity of node 102's PIT.

[0040] It should be noted that even though node 102 is sharing a PIT with node 1 14, these nodes construct and maintain their own forwarding information base (FIB). Furthermore, the distribution of namespaces 152 and 154 ensures distribution of interests received at node 102 between nodes 102 and 114. However, node 102 remains the node of origin. As a result, in contrast to load balancing techniques, content objects associated with both namespaces 152 and 154 are eventually forwarded to node 102.

Exemplary PIT Sharing

[0041] FIG. 2A illustrates an exemplary PIT sharing based on a proxy PIT, in accordance with an embodiment of the present invention. In this example, device 250 is coupled with node 102 via interface 252. During operation, node 102 receives interests 132 and 204 from devices 1 16 and 250, respectively. Suppose that interests 132 and 204 are for content objects associated with names "/a b/c/d" and "/pl/ql ," respectively. Similarly, node 1 14 receives interest 206 from device 120 for a content object associated with name "/x/y/z." Since interest 132 is for a name in namespace 154, node 102 sends message 130 comprising interest 132 and an identifier of interface 146 via tunnel 140 to node 1 14. While forwarding interest 132 to node 114, node 102 does not decrement the hop count for interest 132 while traversing tunnel 140.

[0042] Suppose that node 1 14, which is the proxy node of node 102, maintains PIT 220 for local entry and proxy PIT 225 for proxy entries. PIT 220 stores an interest name 222 and a local interface 224 via which node 1 14 has received a local interest. Proxy PIT 225 stores an interest name 226 and an interface of origin 228, which is an interface of node 102. Here, storing an interface indicates storing an identifier of the interface. This identifier can be a local and internal identifier of a node. [0043] Upon receiving message 130, node 1 14 obtains interest 132 and an identifier of interface 136 by decapsulating message 130. Node 114 determines that name "/pl/ql " in interest 132 is in namespace 154 and hence, should be in a proxy PIT entry. Node 1 14 then creates an entry in a proxy PIT 225 comprising name "/pl/ql " and the identifier of interface 146. Node 114 then forwards interest 132 in network 100. When node 114 receives a content object 202, node 114 retrieves and removes the proxy PIT entry associated with name "/pl/ql ." Node 114 includes content object 202 and the identifier of interface 146 in message 136 and sends message 136 via tunnel 140 to node 102.

[0044] Node 102 receives message 136, and obtains content object 202 and the identifier of interface 146 by decapsulating message 136. Since node 102 has received message 136 via tunnel 140, node 102 is aware that message 136 includes a content object and the interface via which content object 202 should be forwarded. In some embodiments, node 102 determines that name "/pl/ql" of content object 202 is in namespace 154 and hence, content object 202 has already "consumed" a proxy PIT entry. Node 102 then forwards content object 202 via interface 146 to device 1 16 without consulting its local PIT 210. In this way, node 102 uses proxy node 114 to extend the capacity of node 102's PIT while continuing using a local PIT.

[0045] However, when node 102 receives interest 204 from device 250, node 102 determines that name "/a/b/c/d" in interest 204 is in namespace 152 and hence, should be in a local PIT entry. Node 102 then creates an entry in PIT 210. PIT 210 stores an interest name 212 and an interface 214. The entry comprises name "/a/b/c/d" of interest 204 and the identifier of interface 252. Node 102 then forwards interest 204 in network 100. Suppose that node 102 receives a corresponding content object 205 from node 1 14. Upon receiving content object 205, node 102 determines that name "a/b/c/d" of content object 205 is in namespace 152 and hence, should be processed based on a local PIT entry. Node 102 retrieves and removes the proxy PIT entry associated with name "a/b/c/d" to obtain an identifier of interface 252. Node 102 then forwards content object 205 via interface 252 to device 250.

[0046] In the same way, when node 114 receives interest 206 from device 120, node 1 14 determines that name "/x/y/z" in interest 206 is from a local interface 148 and hence, should be in a local PIT entry. Node 114 then creates an entry in PIT 220 comprising name "x/y/z" and the identifier of interface 148. Node 1 14 then forwards interest 206 in network 100. Suppose that node 102 receives a corresponding content object 207. Upon receiving content object 207, node 114 determines that name "x/y/z" of content object 207 is not in namespace 154 and hence, should been processed based on a local PIT entry. Node 1 14 retrieves and removes the PIT entry associated with name "x/y/z" to obtain an identifier of interface 148. Node 114 then forwards content obj ect 207 via interface 148 to device 120.

[0047] FIG. 2B illustrates an exemplary PIT sharing based on a proxy interface mapping, in accordance with an embodiment of the present invention. In this example, node 1 14 stores proxy entries and local entries in the same PIT 230. PIT 230 stores an interest name 232, a proxy interface 234 (i.e., the interface via which node 114 has received a proxy message), and an interface of origin 236. Interface of origin 236 represents the interface via which nodes 1 14 and 102 have received an interest. Here, storing an interface indicates storing an identifier of the interface. In some embodiments, node 1 14 maintains a mapping between proxy interface 232 and interface of origin 236 in a separate table. PIT 230 then can store an interest name 232 and an interface of origin 236.

[0048] If an entry in PIT 230 is a proxy entry, node 114 stores both the proxy interface (i.e., the interface via which node 114 has received a proxy message) and the interface of origin. On the other hand, if an entry in PIT 230 is a local entry, node 114 stores an identifier of the interface via which the interest has been received. In some embodiments, if an entry in PIT 230 is a local entry, node 1 14 also stores a value indicating that the entry is a local entry. Examples of the value include, but are not limited to, a null value, an empty value (or string), and a value sufficiently distinct from an identifier of an interface.

[0049] Upon receiving message 130 via interface 144, node 114 obtains interest 132 and an identifier of interface 136 by decapsulating message 130. Node 114 determines that name "/pl/ql " in interest 132 is in namespace 154 and hence, should be in a proxy entry. Node 114 then creates an entry in PIT 230 comprising name "/pl/ql," the identifier of proxy interface 144, and the identifier of interface 146. Node 114 then forwards interest 132 in network 100. When node 114 receives content object 202, node 114 retrieves and removes the PIT entry associated with name "/pl/ql ." Node 1 14 includes content object 202 and the identifier of interface 146 in message 136 and sends message 136 via proxy interface 144.

[0050] On the other hand, when node 114 receives interest 206 from device 120, node 114 determines that name "/x/y/z" in interest 206 is from a local interface 148 and hence, should be in a local PIT entry. Node 114 then creates an entry in PIT 230 comprising name "x/y/z," a value 210, which indicates the PIT entry to be a local PIT entry, and the identifier of interface 148. Here, node 114 can use value 210 in place of a proxy interface value (i.e., in the same column) to use the same PIT for both local and proxy entries. In the same way, node 114 uses the same column to store identifiers of interfaces 146 and 148. Node 1 14 then forwards interest 206 in network 100. Suppose that node 102 receives a corresponding content object 207. Upon receiving content obj ect 207, node 1 14 retrieves and removes the PIT entry associated with name "x/y/z" to obtain value 210 and an identifier of interface 148. Node 114 determines that value 210 is present in the entry and hence, the entry is a local entry. Node 1 14 then forwards content object 207 via interface 148 to device 120.

[0051] FIG. 2C illustrates an exemplary PIT sharing based on a tunnel mapping, in accordance with an embodiment of the present invention. In this example, nodes 102 and 1 14 maintain a tunnel for a respective interface of origin. For example, tunnel 140 can correspond to interface 146. As a result, when node 102 receives a content object from tunnel 140 via interface 142, node 102 forwards that content object via interface 146. In some embodiments, node 102 maintains a mapping 280 between a tunnel interface 282 and an interface of origin 284.

Mapping 280 includes a mapping between interface 142 and interface 146.

[0052] Since node 102 maintains mapping 280, node 1 14 stores proxy entries and local entries in the same PIT 240. PIT 240 stores an interest name 242 and an interface 244. Interface 244 represents the local interface via which node 1 14 has received an interest or a proxy message. Here, storing an interface indicates storing an identifier of the interface. In this example, node 102 encapsulates interest 132 in message 131 and forwards message 131 via interface 142. Upon receiving message 131 via interface 144, node 114 obtains interest 132 by decapsulating message 131. Node 114 then creates an entry in PIT 240 comprising name "/pl/ql " and the identifier of interface 144 via which node 1 14 has received interest 132. Node 114 then forwards interest 132 in network 100. When node 114 receives content object 202, node 114 retrieves and removes the PIT entry associated with name "/pl/ql ." Node 1 14 includes content object 202 in message 138 and sends message 138 via obtained interface 144.

[0053] Upon receiving message 138 via interface 142, node 102 decapsulates message 138 to obtain content object 202. Node 102 determines that message 138 is received via tunnel 140 and hence, is from a proxy node. In some embodiments, node 102 determines that name "/pl/ql " of content object 202 is in namespace 154 and hence, content object 202 has already "consumed" a proxy PIT entry. Node 102 then looks up interface 142 in mapping 280 to obtain interface 146 as the interface via which content object 202 should be forwarded. Node 102 then forwards content object 202 via interface 146 to device 1 16 without consulting its local PIT 210. Forwarding Interest to the Proxy Node

[0054] When node 102 forwards interest 132 to node 1 14, node 102 uses tunnel 140 to forward interest 132. FIG. 3 presents a flow chart 300 illustrating a method for offloading an interest to a proxy node, in accordance with an embodiment of the present invention. During operation, a node of origin receives an interest for a content object via a local interface

(operation 302). The node determines whether the name of the content object is in a proxy namespace (operation 304). The proxy namespace determines whether interests corresponding to the namespace should be forwarded to a proxy node.

[0055] If the name is not in the proxy namespace, the node creates a local PIT entry comprising the name and the local interface (operation 306). The node then forwards the interest based on the local FIB (operation 310). If the name is in the proxy namespace, the node encapsulates the interest and an interface of origin, which is the local interface, in a tunnel message (operation 308). The node may not include the interface of origin in the tunnel message if the node maintains a tunnel mapping, as described in conjunction with FIG. 2C. The node then forwards the tunnel message to the proxy node based on the local FIB (operation 310). It should be noted that the local interface is represented in a PIT entry or the tunnel message by an identifier of the local interface.

Operations of the Proxy Node

[0056] FIG. 4A presents a flow chart 400 illustrating a method of a proxy node sharing a

PIT based on a proxy PIT, in accordance with an embodiment of the present invention. During operation, a proxy node receives a tunnel message comprising an interest and an interface of origin (operation 402). The node decapsulates the tunnel message (operation 404) and determines the interest as a proxy interest since the name of the interest is in a proxy namespace (operation 406). The node creates an entry comprising the name of the interest and the interface of origin obtained from the message in a proxy PIT (operation 408). The node then forwards the interest based on a local FIB (operation 410).

[0057] This interest travels though the network and the corresponding content object comes back to the node. The node receives the content obj ect associated with the name

(operation 412) and selects the proxy PIT based on the name matching a proxy namespace (operation 414). The node obtains the interface of origin associated with the name from the proxy PIT and removes the corresponding PIT entry (operation 416). Since the name is in the proxy namespace, the node selects the interface of the proxy tunnel as the outgoing interface (operation 418). The node encapsulates the content object and the interface of origin in a tunnel message (operation 420) and forwards the tunnel message via the selected interface (operation 422).

[0058] FIG. 4B presents a flow chart 430 illustrating a method of a proxy node sharing a PIT based on a proxy interface mapping, in accordance with an embodiment of the present invention. During operation, a proxy node receives a tunnel message comprising an interest and an interface of origin via a local proxy interface (operation 432). The node decapsulates the tunnel message (operation 434) and determines the interest as a proxy interest since the name of the interest is in a proxy namespace (operation 436). The node creates an entry comprising the name of the interest, the proxy interface (the local tunnel interface), and the interface of origin in the local PIT (operation 438). If the entry is not a proxy entry, an entry can include the name of the interest, the interface of origin, and a value indicating the entry to be a local entry. The node then forwards the interest based on a local FIB (operation 440).

[0059] This interest travels though the network and the corresponding content object comes back to the node. The node receives the content obj ect associated with the name

(operation 442). The node obtains the interface of origin and the proxy interface associated with the name from the PIT and removes the corresponding PIT entry (operation 444). Since the name is in the proxy namespace, the node determines the interface of the proxy tunnel to be the outgoing interface. The node encapsulates the content obj ect and the interface of origin in a tunnel message (operation 446) and forwards the tunnel message via the obtained proxy interface (operation 448).

[0060] FIG. 4C presents a flow chart 460 illustrating a method of a proxy node sharing a PIT based on a tunnel mapping at a node of origin, in accordance with an embodiment of the present invention. During operation, a proxy node receives a tunnel message comprising an interest via a local proxy interface (operation 462). The node decapsulates the tunnel message (operation 464) and creates an entry comprising the name of the interest and the proxy interface (the local tunnel interface) in the local PIT (operation 466). The node then forwards the interest based on a local FIB (operation 468).

[0061] This interest travels though the network and the corresponding content object comes back to the node. The node receives the content obj ect associated with the name

(operation 470). The node obtains the proxy interface associated with the name from the PIT and removes the corresponding PIT entry (operation 472). The node encapsulates the content object in a tunnel message (operation 474) and forwards the tunnel message via the obtained proxy interface (operation 476).

Forwarding Content Object

[0062] FIG. 5A presents a flow chart 500 illustrating a method for forwarding a content object based on PIT sharing, in accordance with an embodiment of the present invention. During operation, a node of origin receives a tunnel message comprising the content object and the interface of origin (operation 502). The node decapsulates the tunnel message to obtain the content object and the interface of origin (operation 504). The node then forwards the content object via the obtained interface of origin without consulting the local PIT (operation 506).

[0063] FIG. 5B presents a flow chart 550 illustrating a method for forwarding a content object based on PIT sharing and a tunnel mapping, in accordance with an embodiment of the present invention. During operation, a node of origin receives a tunnel message comprising the content object (operation 552). The node decapsulates the tunnel message to obtain the content object (operation 554). The node identifies the interface of origin mapped to the tunnel interface (operation 556). The node then forwards the content object via the identified interface of origin without consulting the local PIT (operation 558).

Exemplary Apparatus and Computer System

[0064] FIG. 6 illustrates an exemplary apparatus that facilitates PIT sharing, in accordance with an embodiment of the present invention. Apparatus 600 can comprise a plurality of modules, which may communicate with one another via a wired or wireless communication channel. Apparatus 600 may be realized using one or more integrated circuits, and may include fewer or more modules than those shown in FIG. 6. Further, apparatus 600 may be integrated in a computer system, or realized as a separate device that is capable of communicating with other computer systems and/or devices. Specifically, apparatus 600 can comprise a communication module 602, a tunneling module 604, a PIT management module 606, and a proxy management module 608.

[0065] In some embodiments, communication module 602 can send and/or receive data packets to/from other network nodes across a computer network, such as a content-centric network. Communication module 602 can create, send, and receive tunnel-encapsulated messages. Such messages can include one or more of: an interest, a content object, an interface of origin, and a proxy interface. Tunneling module 604 can encapsulate a notification message in a tunnel encapsulation (e.g., based on a tunneling protocol).

[0066] PIT management module 606 allows apparatus 600 to operate as a proxy node. PIT management module 606 maintains and manages proxy entries in a PIT (either in a separate or a combined PIT) for interests from a node of origin. Proxy management module 608 allows apparatus 600 to operate as a node of origin. Proxy management module 608 determines a proxy node and a proxy namespace. PIT management module 606 also determines whether a name is in a proxy namespace. In some embodiments, proxy management module 608 maintains a mapping between a tunnel interface and an interface of origin.

[0067] FIG. 7 illustrates an exemplary computer system that facilitates PIT sharing, in accordance with an embodiment of the present invention. Computer system 702 includes a processor 704, a memory 706, and a storage device 708. Memory 706 can include a volatile memory (e.g., RAM) that serves as a managed memory, and can be used to store one or more memory pools. Furthermore, computer system 702 can be coupled to a display device 710, a keyboard 712, and a pointing device 714. Storage device 708 can store an operating system 716, a PIT sharing system 718, and data 732.

[0068] PIT sharing system 718 can include instructions, which when executed by computer system 702, can cause computer system 702 to perform methods and/or processes described in this disclosure. Specifically, PIT sharing system 718 may include instructions for sending and/or receiving data packets to/from other network nodes across a computer network, such as a content-centric network (communication module 720). Further, PIT sharing system 718 may include instructions for sending and/or receiving data packets to/from other network nodes across a computer network, such as a content-centric network. This packet can be an encapsulated message.

[0069] PIT sharing system 718 can include instructions for encapsulating a notification message in a tunnel encapsulation (e.g., based on a tunneling protocol) (tunneling module 722). PIT sharing system 718 can also include instructions for maintaining and managing proxy entries in a PIT (either in a separate or a combined PIT) for interests from a node of origin (PIT management module 724). In addition, PIT sharing system 718 can include instructions for determining whether a name is in a proxy namespace (PIT management module 724).

Furthermore, PIT sharing system 718 can also include instructions for a proxy node and a proxy namespace, and for maintaining a mapping between a tunnel interface and an interface of origin (proxy management module 726). [0070] Data 732 can include any data that is required as input or that is generated as output by the methods and/or processes described in this disclosure. Specifically, data 732 can store one or more PITs and a mapping. Data 732 can also include an FIB of computer system 702.

[0071] The data structures and code described in this detailed description are typically stored on a computer-readable storage medium, which may be any device or medium that can store code and/or data for use by a computer system. The computer-readable storage medium includes, but is not limited to, volatile memory, non-volatile memory, magnetic and optical storage devices such as disk drives, magnetic tape, CDs (compact discs), DVDs (digital versatile discs or digital video discs), or other media capable of storing computer-readable media now known or later developed.

[0072] The methods and processes described in the detailed description section can be embodied as code and/or data, which can be stored in a computer-readable storage medium as described above. When a computer system reads and executes the code and/or data stored on the computer-readable storage medium, the computer system performs the methods and processes embodied as data structures and code and stored within the computer-readable storage medium.

[0073] Furthermore, the methods and processes described above can be included in hardware modules. For example, the hardware modules can include, but are not limited to, application-specific integrated circuit (ASIC) chips, field-programmable gate arrays (FPGAs), and other programmable-logic devices now known or later developed. When the hardware modules are activated, the hardware modules perform the methods and processes included within the hardware modules.

[0074] The foregoing descriptions of embodiments of the present invention have been presented for purposes of illustration and description only. They are not intended to be exhaustive or to limit the present invention to the forms disclosed. Accordingly, many modifications and variations will be apparent to practitioners skilled in the art. Additionally, the above disclosure is not intended to limit the present invention. The scope of the present invention is defined by the appended claims.