<?xml version='1.0' encoding='utf-8'?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" version="3" category="info" consensus="true" docName="draft-irtf-icnrg-terminology-08" indexInclude="true" ipr="trust200902" number="8793" prepTime="2020-06-17T17:55:58" scripts="Common,Latin" sortRefs="true" submissionType="IRTF" symRefs="true" tocDepth="3" tocInclude="true" xml:lang="en">
  <link href="https://datatracker.ietf.org/doc/draft-irtf-icnrg-terminology-08" rel="prev"/>
  <link href="https://dx.doi.org/10.17487/rfc8793" rel="alternate"/>
  <link href="urn:issn:2070-1721" rel="alternate"/>
  <front>
    <title abbrev="ICN Terminology">Information-Centric Networking (ICN): Content-Centric Networking (CCNx) and Named Data Networking (NDN) Terminology</title>
    <seriesInfo name="RFC" value="8793" stream="IRTF"/>
    <author fullname="Bastiaan Wissingh" initials="B." surname="Wissingh">
      <organization showOnFrontPage="true">TNO</organization>
      <address>
        <email>bastiaan.wissingh@tno.nl</email>
      </address>
    </author>
    <author fullname="Christopher A. Wood" initials="C." surname="Wood">
      <organization showOnFrontPage="true">University of California Irvine</organization>
      <address>
        <email>caw@heapingbits.net</email>
      </address>
    </author>
    <author fullname="Alex Afanasyev" initials="A." surname="Afanasyev">
      <organization showOnFrontPage="true">Florida International University</organization>
      <address>
        <email>aa@cs.fiu.edu</email>
      </address>
    </author>
    <author fullname="Lixia Zhang" initials="L." surname="Zhang">
      <organization showOnFrontPage="true">UCLA</organization>
      <address>
        <email>lixia@cs.ucla.edu</email>
      </address>
    </author>
    <author fullname="David Oran" initials="D." surname="Oran">
      <organization showOnFrontPage="true">Network Systems Research &amp; Design</organization>
      <address>
        <email>daveoran@orandom.net</email>
      </address>
    </author>
    <author fullname="Christian Tschudin" initials="C." surname="Tschudin">
      <organization showOnFrontPage="true">University of Basel</organization>
      <address>
        <email>christian.tschudin@unibas.ch</email>
      </address>
    </author>
    <date month="06" year="2020"/>
    <area>IRTF</area>
    <workgroup>Information-Centric Networking</workgroup>
    <keyword>content routing</keyword>
    <keyword>content caching</keyword>
    <keyword>content distribution networks</keyword>
    <keyword>data-centric security</keyword>
    <abstract pn="section-abstract">
      <t pn="section-abstract-1">Information-Centric Networking (ICN) is a novel paradigm where network communications are accomplished by requesting named content instead of sending packets to destination addresses. Named Data Networking (NDN) and Content-Centric Networking (CCNx) are two prominent ICN architectures. This document provides an overview of the terminology and definitions that have been used in describing concepts in these two implementations of ICN. While there are other ICN architectures, they are not part of the NDN and CCNx concepts and as such are out of scope for this document. This document is a product of the Information-Centric Networking Research Group (ICNRG).
      </t>
    </abstract>
    <boilerplate>
      <section anchor="status-of-memo" numbered="false" removeInRFC="false" toc="exclude" pn="section-boilerplate.1">
        <name slugifiedName="name-status-of-this-memo">Status of This Memo</name>
        <t pn="section-boilerplate.1-1">
            This document is not an Internet Standards Track specification; it is
            published for informational purposes.  
        </t>
        <t pn="section-boilerplate.1-2">
            This document is a product of the Internet Research Task Force
            (IRTF).  The IRTF publishes the results of Internet-related
            research and development activities.  These results might not be
            suitable for deployment.  This RFC represents the consensus of the Information-Centric Networking
            Research Group of the Internet Research Task Force (IRTF).
            Documents approved for publication by the IRSG are not a
            candidate for any level of Internet Standard; see Section 2 of RFC
            7841.   
        </t>
        <t pn="section-boilerplate.1-3">
            Information about the current status of this document, any
            errata, and how to provide feedback on it may be obtained at
            <eref target="https://www.rfc-editor.org/info/rfc8793" brackets="none"/>.
        </t>
      </section>
      <section anchor="copyright" numbered="false" removeInRFC="false" toc="exclude" pn="section-boilerplate.2">
        <name slugifiedName="name-copyright-notice">Copyright Notice</name>
        <t pn="section-boilerplate.2-1">
            Copyright (c) 2020 IETF Trust and the persons identified as the
            document authors. All rights reserved.
        </t>
        <t pn="section-boilerplate.2-2">
            This document is subject to BCP 78 and the IETF Trust's Legal
            Provisions Relating to IETF Documents
            (<eref target="https://trustee.ietf.org/license-info" brackets="none"/>) in effect on the date of
            publication of this document. Please review these documents
            carefully, as they describe your rights and restrictions with
            respect to this document.
        </t>
      </section>
    </boilerplate>
    <toc>
      <section anchor="toc" numbered="false" removeInRFC="false" toc="exclude" pn="section-toc.1">
        <name slugifiedName="name-table-of-contents">Table of Contents</name>
        <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1">
          <li pn="section-toc.1-1.1">
            <t keepWithNext="true" pn="section-toc.1-1.1.1"><xref derivedContent="1" format="counter" sectionFormat="of" target="section-1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-introduction">Introduction</xref></t>
          </li>
          <li pn="section-toc.1-1.2">
            <t keepWithNext="true" pn="section-toc.1-1.2.1"><xref derivedContent="2" format="counter" sectionFormat="of" target="section-2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-a-sketch-of-the-big-picture">A Sketch of the Big Picture of ICN</xref></t>
          </li>
          <li pn="section-toc.1-1.3">
            <t pn="section-toc.1-1.3.1"><xref derivedContent="3" format="counter" sectionFormat="of" target="section-3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-terms-by-category">Terms by Category</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.3.2">
              <li pn="section-toc.1-1.3.2.1">
                <t keepWithNext="true" pn="section-toc.1-1.3.2.1.1"><xref derivedContent="3.1" format="counter" sectionFormat="of" target="section-3.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-generic-terms">Generic Terms</xref></t>
              </li>
              <li pn="section-toc.1-1.3.2.2">
                <t pn="section-toc.1-1.3.2.2.1"><xref derivedContent="3.2" format="counter" sectionFormat="of" target="section-3.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-terms-related-to-icn-nodes">Terms Related to ICN Nodes</xref></t>
              </li>
              <li pn="section-toc.1-1.3.2.3">
                <t pn="section-toc.1-1.3.2.3.1"><xref derivedContent="3.3" format="counter" sectionFormat="of" target="section-3.3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-terms-related-to-the-forwar">Terms Related to the Forwarding Plane</xref></t>
              </li>
              <li pn="section-toc.1-1.3.2.4">
                <t pn="section-toc.1-1.3.2.4.1"><xref derivedContent="3.4" format="counter" sectionFormat="of" target="section-3.4"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-terms-related-to-packet-typ">Terms Related to Packet Types</xref></t>
              </li>
              <li pn="section-toc.1-1.3.2.5">
                <t pn="section-toc.1-1.3.2.5.1"><xref derivedContent="3.5" format="counter" sectionFormat="of" target="section-3.5"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-terms-related-to-name-types">Terms Related to Name Types</xref></t>
              </li>
              <li pn="section-toc.1-1.3.2.6">
                <t pn="section-toc.1-1.3.2.6.1"><xref derivedContent="3.6" format="counter" sectionFormat="of" target="section-3.6"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-terms-related-to-name-usage">Terms Related to Name Usage</xref></t>
              </li>
              <li pn="section-toc.1-1.3.2.7">
                <t pn="section-toc.1-1.3.2.7.1"><xref derivedContent="3.7" format="counter" sectionFormat="of" target="section-3.7"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-terms-related-to-data-centr">Terms Related to Data-Centric Security</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.4">
            <t pn="section-toc.1-1.4.1"><xref derivedContent="4" format="counter" sectionFormat="of" target="section-4"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-semantics-and-usage">Semantics and Usage</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.4.2">
              <li pn="section-toc.1-1.4.2.1">
                <t pn="section-toc.1-1.4.2.1.1"><xref derivedContent="4.1" format="counter" sectionFormat="of" target="section-4.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-data-transfer">Data Transfer</xref></t>
              </li>
              <li pn="section-toc.1-1.4.2.2">
                <t pn="section-toc.1-1.4.2.2.1"><xref derivedContent="4.2" format="counter" sectionFormat="of" target="section-4.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-data-transport">Data Transport</xref></t>
              </li>
              <li pn="section-toc.1-1.4.2.3">
                <t pn="section-toc.1-1.4.2.3.1"><xref derivedContent="4.3" format="counter" sectionFormat="of" target="section-4.3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-lookup-service">Lookup Service</xref></t>
              </li>
              <li pn="section-toc.1-1.4.2.4">
                <t pn="section-toc.1-1.4.2.4.1"><xref derivedContent="4.4" format="counter" sectionFormat="of" target="section-4.4"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-database-access">Database Access</xref></t>
              </li>
              <li pn="section-toc.1-1.4.2.5">
                <t pn="section-toc.1-1.4.2.5.1"><xref derivedContent="4.5" format="counter" sectionFormat="of" target="section-4.5"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-remote-procedure-call">Remote Procedure Call</xref></t>
              </li>
              <li pn="section-toc.1-1.4.2.6">
                <t pn="section-toc.1-1.4.2.6.1"><xref derivedContent="4.6" format="counter" sectionFormat="of" target="section-4.6"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-publish-subscribe">Publish/Subscribe</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.5">
            <t pn="section-toc.1-1.5.1"><xref derivedContent="5" format="counter" sectionFormat="of" target="section-5"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-iana-considerations">IANA Considerations</xref></t>
          </li>
          <li pn="section-toc.1-1.6">
            <t pn="section-toc.1-1.6.1"><xref derivedContent="6" format="counter" sectionFormat="of" target="section-6"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-security-considerations">Security Considerations</xref></t>
          </li>
          <li pn="section-toc.1-1.7">
            <t pn="section-toc.1-1.7.1"><xref derivedContent="7" format="counter" sectionFormat="of" target="section-7"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-references">References</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.7.2">
              <li pn="section-toc.1-1.7.2.1">
                <t pn="section-toc.1-1.7.2.1.1"><xref derivedContent="7.1" format="counter" sectionFormat="of" target="section-7.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-normative-references">Normative References</xref></t>
              </li>
              <li pn="section-toc.1-1.7.2.2">
                <t pn="section-toc.1-1.7.2.2.1"><xref derivedContent="7.2" format="counter" sectionFormat="of" target="section-7.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-informative-references">Informative References</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.8">
            <t pn="section-toc.1-1.8.1"><xref derivedContent="" format="none" sectionFormat="of" target="section-appendix.a"/><xref derivedContent="" format="title" sectionFormat="of" target="name-acknowledgments">Acknowledgments</xref></t>
          </li>
          <li pn="section-toc.1-1.9">
            <t pn="section-toc.1-1.9.1"><xref derivedContent="" format="none" sectionFormat="of" target="section-appendix.b"/><xref derivedContent="" format="title" sectionFormat="of" target="name-authors-addresses">Authors' Addresses</xref></t>
          </li>
        </ul>
      </section>
    </toc>
  </front>
  <middle>
    <section anchor="introduction" numbered="true" toc="include" removeInRFC="false" pn="section-1">
      <name slugifiedName="name-introduction">Introduction</name>
      <t pn="section-1-1">Information-centric networking (ICN) is an architecture to evolve the
      Internet infrastructure from the existing host-centric design to a
      data-centric architecture, where accessing data by name becomes the
      essential network primitive. The goal is to let applications refer to
      data independently of their location or means of transportation, which
      enables native multicast delivery, ubiquitous in-network caching, and
      replication of data objects. </t>
      <t pn="section-1-2">As the work on this topic continues to evolve, many new terms are
      emerging. The goal of this document is to collect the key terms with a
      corresponding definition as they are used in the CCNx and NDN
      projects. Among the important documents for these projects are <xref target="RFC8569" format="default" sectionFormat="of" derivedContent="RFC8569"/>, <xref target="RFC8609" format="default" sectionFormat="of" derivedContent="RFC8609"/>, and <xref target="NDNTLV" format="default" sectionFormat="of" derivedContent="NDNTLV"/>. Other ICN projects such as <xref target="NETINF" format="default" sectionFormat="of" derivedContent="NETINF"/>, <xref target="PSIRP" format="default" sectionFormat="of" derivedContent="PSIRP"/>, or <xref target="MOBILITY-FIRST" format="default" sectionFormat="of" derivedContent="MOBILITY-FIRST"/> are not covered and may be
      the subject of other documents.</t>
      <t pn="section-1-3">In this document, to help provide context for the individual defined terms, we first sketch the bigger picture of an ICN network by
      introducing the basic concepts and identifying the major components of
      the architecture in <xref target="a-sketch-of-the-big-picture-of-icn" format="default" sectionFormat="of" derivedContent="Section 2"/>; after which, in <xref target="terms-by-category" format="default" sectionFormat="of" derivedContent="Section 3"/>, ICN-related terms are listed by different
      categories. Readers should be aware that in this organization, some terms
      may be used in other definitions before they themselves are defined.</t>
      <t pn="section-1-4">While this terminology document describes both confidentiality and
      integrity-related terms, it should be noted that ICN architectures like
      NDN and CCNx generally do not provide data confidentiality, which is
      treated in these architectures as an application-layer concern.</t>
      <t pn="section-1-5">This document represents the consensus of the Information-Centric
      Networking Research Group (ICNRG). It has been reviewed extensively by
      the Research Group (RG) members active in the specific areas of work
      covered by the document. It is not an IETF product and is not intended
      for standardization in the IETF.</t>
    </section>
    <section anchor="a-sketch-of-the-big-picture-of-icn" numbered="true" toc="include" removeInRFC="false" pn="section-2">
      <name slugifiedName="name-a-sketch-of-the-big-picture">A Sketch of the Big Picture of ICN</name>
      <t pn="section-2-1">In networking terms, an ICN is a delivery infrastructure for named
      data. For other complementing views, see <xref target="semantics-and-usage" format="default" sectionFormat="of" derivedContent="Section 4"/>.</t>
      <figure anchor="fig_i-d-protocol" align="left" suppress-title="false" pn="figure-1">
        <name slugifiedName="name-request-reply-protocol-of-i">Request-Reply Protocol of ICN Networking.</name>
        <artwork align="center" name="" type="" alt="" pn="section-2-2.1">
requestor         zero or more           data sources or
(node)          forwarding nodes         replica nodes
  |                 | ... |                  |...|
  |   Interest(n)   |     |   Interest(n)    |   |
  | --------------&gt; |     | ---------------&gt; |   |
  |                 |     | -------------------&gt; |
  |                 |     |                  |   |
  |                 |     |  Data([n],c,[s]) |   |
  |                 |     | &lt;--------------- |   |
  |                 |     | &lt;------------------- |
  | Data([n],c,[s]) |     |                  |   |
  | &lt;-------------- |     |                  |   |

      Legend: n=name, c=content, s=signature</artwork>
      </figure>
      <t pn="section-2-3">The following list describes the basic ICN concepts needed to discuss
      the implementation of this service abstraction.</t>
      <t pn="section-2-4"><strong>Request-Reply Protocol (Interest and Data
      Packet):</strong></t>
      <ul empty="true" spacing="normal" bare="false" pn="section-2-5">
        <li pn="section-2-5.1">An ICN's lookup service is implemented by defining two types of
        network packet formats: <xref target="interest_packet" format="none" sectionFormat="of" derivedContent="">Interest packets</xref> that request content by name and
        <xref target="data_packet" format="none" sectionFormat="of" derivedContent="">Data packets</xref> that
        carry the requested content. The returned Data packet must match the
        request's parameters (e.g., having a partially or fully matching
        name). If the request is ambiguous and several Data packets would
        satisfy the request, the ICN network returns only one matching Data
        packet (thus achieving flow balance between Interest and Data packets
        over individual Layer 2 interfaces).</li>
      </ul>
      <t pn="section-2-6"><strong>Packet and Content Names:</strong></t>
      <ul empty="true" spacing="normal" bare="false" pn="section-2-7">
        <li pn="section-2-7.1">Without a strong cryptographic binding between the name of a <xref target="data_packet" format="none" sectionFormat="of" derivedContent="">Data packet</xref> and its content, Data
        packet names would be useless for fetching specific content. In ICN,
        verification of a Data packet's name-to-content binding is achieved
        through cryptographic means either by (1) a cryptographic signature
        that explicitly binds an application-chosen name to a Data packet's
        content or by (2) relying on an implicit name (cryptographic hash of
        the Data packet with or without application-chosen name) that the data
        consumer obtained through other means.</li>
      </ul>
      <t pn="section-2-8"><strong>Data Authenticity and Encryption:</strong></t>
      <ul empty="true" spacing="normal" bare="false" pn="section-2-9">
        <li pn="section-2-9.1">Any data consumer or network element can (in principle) validate
        the authenticity of a <xref target="data_packet" format="none" sectionFormat="of" derivedContent="">Data
        packet</xref> by verifying its cryptographic name-to-content
        binding. Note that data authenticity is distinct from data
        trustworthiness, though the two concepts are related.  A packet is
        authentic if it has a valid name-to-content binding, but it may still
        be unwise to "trust" the content for any particular purpose.</li>
      </ul>
      <t pn="section-2-10"><strong>Trust:</strong></t>
      <ul empty="true" spacing="normal" bare="false" pn="section-2-11">
        <li pn="section-2-11.1">Data authenticity is distinct from data trustworthiness, though
        the two concepts are related. A packet is authentic if it has a valid
        name-to-content binding. A packet is trustworthy, i.e., it comes from
        a reputable or trusted origin, if this binding is valid in the context
        of a trust model. The trust model provides assurance that the name
        used for a given piece of content is appropriate for the value of the
        content. <xref target="security-considerations" format="default" sectionFormat="of" derivedContent="Section 6"/>
        discusses this further.</li>
      </ul>
      <t pn="section-2-12"><strong>Segmenting and Versioning:</strong></t>
      <ul empty="true" spacing="normal" bare="false" pn="section-2-13">
        <li pn="section-2-13.1">An ICN network will be engineered for some packet size limit. As
        application-level data objects will often be considerably larger,
        objects must be segmented into multiple <xref target="data_packet" format="none" sectionFormat="of" derivedContent="">Data packets</xref>. The names for these Data packets
        can, for example, be constructed by choosing one application-level
        object name to which a different suffix is added for each segment. The
        same method can be used to handle different versions of an
        application-level object by including a version number in the name of
        the overall object.</li>
      </ul>
      <t pn="section-2-14"><strong>Packet and Frame:</strong></t>
      <ul empty="true" spacing="normal" bare="false" pn="section-2-15">
        <li pn="section-2-15.1">NDN and CCNx introduce Protocol Data Units (PDUs), which typically
        are larger than the maximum transmission unit of the underlying
        networking technology. We refer to PDUs as packets and the
        (potentially fragmented) packet parts that traverse MTU-bound Layer 2
        interfaces as frames. Handling Layer 2 technologies that lead to
        fragmentation of ICN packets is done inside the ICN network and is not
        visible at the service interface.</li>
      </ul>
      <t pn="section-2-16"><strong>ICN Node:</strong></t>
      <ul empty="true" spacing="normal" bare="false" pn="section-2-17">
        <li pn="section-2-17.1">A node within an ICN network can fulfill the role of a data
        producer, a data consumer, and/or a forwarder for <xref target="interest_packet" format="none" sectionFormat="of" derivedContent="">Interest</xref> and <xref target="data_packet" format="none" sectionFormat="of" derivedContent="">Data packets</xref>. When a
        forwarder has connectivity to neighbor nodes, it performs Interest and
        Data packet forwarding in real time. It can also behave as a store and
        forward node carrying an Interest or Data packet for some time before
        forwarding it to the next node. An ICN node may also run routing
        protocols to assist its Interest forwarding decisions.</li>
      </ul>
      <t pn="section-2-18"><strong>Forwarding Plane:</strong></t>
      <ul empty="true" spacing="normal" bare="false" pn="section-2-19">
        <li pn="section-2-19.1">The canonical way of implementing packet forwarding in an ICN
        network relies on three data structures that capture a node's state: a
        Forwarding Interest Base (FIB), a Pending Interest Table (PIT), and a
        <xref target="content_store" format="none" sectionFormat="of" derivedContent="">Content Store</xref>
        (CS). It also utilizes Interest forwarding strategies, which take
        input from both FIB and measurements to make Interest forwarding
        decisions. When a node receives an <xref target="interest_packet" format="none" sectionFormat="of" derivedContent="">Interest packet</xref>, it checks its CS and PIT to find
        a matching entry; if no match is found, the node records the Interest
        in its PIT and forwards the Interest to the next hop(s) towards the
        requested content, based on the information in its FIB.</li>
      </ul>
    </section>
    <section anchor="terms-by-category" numbered="true" toc="include" removeInRFC="false" pn="section-3">
      <name slugifiedName="name-terms-by-category">Terms by Category</name>
      <section anchor="generic-terms" numbered="true" toc="include" removeInRFC="false" pn="section-3.1">
        <name slugifiedName="name-generic-terms">Generic Terms</name>
        <t pn="section-3.1-1"><strong>Information-Centric Networking (ICN):</strong></t>
        <ul empty="true" spacing="normal" bare="false" pn="section-3.1-2">
          <li pn="section-3.1-2.1">A networking architecture that retrieves <xref target="data_packet" format="none" sectionFormat="of" derivedContent="">Data packets</xref> in
          response to <xref target="interest_packet" format="none" sectionFormat="of" derivedContent="">Interest packets</xref>. Content-Centric Networking (CCNx 1.x)
          and Named Data Networking (NDN) are two realizations (designs) of an
          ICN architecture.</li>
        </ul>
        <t pn="section-3.1-3"><strong>Data Packet Immutability:</strong></t>
        <ul empty="true" spacing="normal" bare="false" pn="section-3.1-4">
          <li pn="section-3.1-4.1">After a <xref target="data_packet" format="none" sectionFormat="of" derivedContent="">Data
          packet</xref> is created, the cryptographic signature binding the
          name to the content ensures that if either the content or the name
          changes, that change will be detected and the packet discarded. If
          the content carried in a Data packet is intended to be mutable,
          versioning of the name should be used so that each version uniquely
          identifies an immutable instance of the content. This allows
          disambiguation of various versions of content such that coordination
          among the various instances in a distributed system can be
          achieved.</li>
        </ul>
      </section>
      <section anchor="terms-related-to-icn-nodes" numbered="true" toc="include" removeInRFC="false" pn="section-3.2">
        <name slugifiedName="name-terms-related-to-icn-nodes">Terms Related to ICN Nodes</name>
        <t pn="section-3.2-1"><strong>ICN Interface:</strong></t>
        <ul empty="true" spacing="normal" bare="false" pn="section-3.2-2">
          <li pn="section-3.2-2.1">A generalization of the network interface that can represent a
          physical network interface (ethernet, Wi-Fi, bluetooth adapter,
          etc.), an overlay inter-node channel (IP/UDP tunnel, etc.), or an
          intra-node inter-process communication (IPC) channel to an
          application (unix socket, shared memory, intents, etc.).</li>
        </ul>
        <ul empty="true" spacing="normal" bare="false" pn="section-3.2-3">
          <li pn="section-3.2-3.1">
            <ul empty="true" spacing="normal" bare="false" pn="section-3.2-3.1.1">
              <li pn="section-3.2-3.1.1.1">Common aliases include: face.</li>
            </ul>
          </li>
        </ul>
        <t pn="section-3.2-4"><strong>ICN Consumer:</strong></t>
        <ul empty="true" spacing="normal" bare="false" pn="section-3.2-5">
          <li pn="section-3.2-5.1">An ICN entity that requests <xref target="data_packet" format="none" sectionFormat="of" derivedContent="">Data packets</xref> by generating and sending out
          <xref target="interest_packet" format="none" sectionFormat="of" derivedContent="">Interest packets</xref>
          towards local (using intra-node interfaces) or remote (using
          inter-node interfaces) ICN Forwarders.</li>
        </ul>
        <ul empty="true" spacing="normal" bare="false" pn="section-3.2-6">
          <li pn="section-3.2-6.1">
            <ul empty="true" spacing="normal" bare="false" pn="section-3.2-6.1.1">
              <li pn="section-3.2-6.1.1.1">Common aliases include: consumer, information consumer, data consumer, consumer of the content.</li>
            </ul>
          </li>
        </ul>
        <t pn="section-3.2-7"><strong>ICN Producer:</strong></t>
        <ul empty="true" spacing="normal" bare="false" pn="section-3.2-8">
          <li pn="section-3.2-8.1">An ICN entity that creates <xref target="data_packet" format="none" sectionFormat="of" derivedContent="">Data packets</xref> and makes them available for
          retrieval.</li>
        </ul>
        <ul empty="true" spacing="normal" bare="false" pn="section-3.2-9">
          <li pn="section-3.2-9.1">
            <ul empty="true" spacing="normal" bare="false" pn="section-3.2-9.1.1">
              <li pn="section-3.2-9.1.1.1">Common aliases include: producer, publisher, information publisher, data publisher, data producer.</li>
            </ul>
          </li>
        </ul>
        <t pn="section-3.2-10"><strong>ICN Forwarder:</strong></t>
        <ul empty="true" spacing="normal" bare="false" pn="section-3.2-11">
          <li pn="section-3.2-11.1">An ICN entity that implements stateful forwarding.</li>
        </ul>
        <ul empty="true" spacing="normal" bare="false" pn="section-3.2-12">
          <li pn="section-3.2-12.1">
            <ul empty="true" spacing="normal" bare="false" pn="section-3.2-12.1.1">
              <li pn="section-3.2-12.1.1.1">Common aliases include: ICN router.</li>
            </ul>
          </li>
        </ul>
        <t pn="section-3.2-13"><strong>ICN Data Node:</strong></t>
        <ul empty="true" spacing="normal" bare="false" pn="section-3.2-14">
          <li pn="section-3.2-14.1">An ICN entity that temporarily stores and potentially carries an
          Interest or <xref target="data_packet" format="none" sectionFormat="of" derivedContent="">Data
          packet</xref> before forwarding it to next ICN entity. Note that
          such ICN data nodes do not have all the properties of data nodes as
          employed in the Delay Tolerant Networking (DTN) <xref target="RFC4838" format="default" sectionFormat="of" derivedContent="RFC4838"/> specifications.</li>
        </ul>
      </section>
      <section anchor="terms-related-to-the-forwarding-plane" numbered="true" toc="include" removeInRFC="false" pn="section-3.3">
        <name slugifiedName="name-terms-related-to-the-forwar">Terms Related to the Forwarding Plane</name>
        <t pn="section-3.3-1"><strong>Stateful Forwarding:</strong></t>
        <ul empty="true" spacing="normal" bare="false" pn="section-3.3-2">
          <li pn="section-3.3-2.1">A forwarding process that records incoming <xref target="interest_packet" format="none" sectionFormat="of" derivedContent="">Interest packets</xref> in
          the PIT and uses the recorded information to forward the retrieved
          <xref target="data_packet" format="none" sectionFormat="of" derivedContent="">Data packets</xref> back to
          the consumer(s). The recorded information can also be used to
          measure data-plane performance, e.g., to adjust interest
          forwarding-strategy decisions.</li>
        </ul>
        <ul empty="true" spacing="normal" bare="false" pn="section-3.3-3">
          <li pn="section-3.3-3.1">
            <ul empty="true" spacing="normal" bare="false" pn="section-3.3-3.1.1">
              <li pn="section-3.3-3.1.1.1">Common aliases include: ICN Data plane, ICN Forwarding.</li>
            </ul>
          </li>
        </ul>
        <t anchor="forwarding_strategy" pn="section-3.3-4"><strong>Forwarding Strategy:</strong></t>
        <ul empty="true" spacing="normal" bare="false" pn="section-3.3-5">
          <li pn="section-3.3-5.1">A module of the ICN stateful forwarding (ICN data) plane that
          implements a decision on where/how to forward the incoming <xref target="interest_packet" format="none" sectionFormat="of" derivedContent="">Interest packet</xref>. The forwarding strategy
          can take input from the Forwarding Information Base (FIB), measured
          data-plane performance parameters, and/or use other mechanisms to
          make the decision.</li>
        </ul>
        <ul empty="true" spacing="normal" bare="false" pn="section-3.3-6">
          <li pn="section-3.3-6.1">
            <ul empty="true" spacing="normal" bare="false" pn="section-3.3-6.1.1">
              <li pn="section-3.3-6.1.1.1">Common aliases include: Interest forwarding strategy.</li>
            </ul>
          </li>
        </ul>
        <t pn="section-3.3-7"><strong>Upstream (forwarding):</strong></t>
        <ul empty="true" spacing="normal" bare="false" pn="section-3.3-8">
          <li pn="section-3.3-8.1">Forwarding packets in the direction of Interests (i.e., Interests are forwarded upstream): consumer, router, router, ..., producer.</li>
        </ul>
        <t pn="section-3.3-9"><strong>Downstream (forwarding):</strong></t>
        <ul empty="true" spacing="normal" bare="false" pn="section-3.3-10">
          <li pn="section-3.3-10.1">Forwarding packets in the opposite direction of Interest
          forwarding (i.e., Data and <xref target="interest_nack" format="none" sectionFormat="of" derivedContent="">Interest Nacks</xref> are forwarded downstream):
          producer, router, ..., consumer(s).</li>
        </ul>
        <t pn="section-3.3-11"><strong>Interest Forwarding:</strong></t>
        <ul empty="true" spacing="normal" bare="false" pn="section-3.3-12">
          <li pn="section-3.3-12.1">A process of forwarding <xref target="interest_packet" format="none" sectionFormat="of" derivedContent="">Interest packets</xref> using the <xref target="name" format="none" sectionFormat="of" derivedContent="">Names</xref> carried in the Interests. In case of
          stateful forwarding, this also involves creating an entry in the
          PIT. The forwarding decision is made by the <xref target="forwarding_strategy" format="none" sectionFormat="of" derivedContent="">Forwarding
          Strategy</xref>.</li>
        </ul>
        <t pn="section-3.3-13"><strong>Interest Aggregation:</strong></t>
        <ul empty="true" spacing="normal" bare="false" pn="section-3.3-14">
          <li pn="section-3.3-14.1">A process of combining multiple <xref target="interest_packet" format="none" sectionFormat="of" derivedContent="">Interest packets</xref> with the same <xref target="name" format="none" sectionFormat="of" derivedContent="">Name</xref> and additional restrictions
          for the same Data into a single PIT entry.</li>
        </ul>
        <ul empty="true" spacing="normal" bare="false" pn="section-3.3-15">
          <li pn="section-3.3-15.1">
            <ul empty="true" spacing="normal" bare="false" pn="section-3.3-15.1.1">
              <li pn="section-3.3-15.1.1.1">Common aliases include: Interest collapsing.</li>
            </ul>
          </li>
        </ul>
        <t pn="section-3.3-16"><strong>Data Forwarding:</strong></t>
        <ul empty="true" spacing="normal" bare="false" pn="section-3.3-17">
          <li pn="section-3.3-17.1">A process of forwarding the incoming <xref target="data_packet" format="none" sectionFormat="of" derivedContent="">Data packet</xref> to the
          interface(s) recorded in the corresponding PIT entry (entries) and
          removing the corresponding PIT entry (entries).</li>
        </ul>
        <t pn="section-3.3-18"><strong>Satisfying an Interest:</strong></t>
        <ul empty="true" spacing="normal" bare="false" pn="section-3.3-19">
          <li pn="section-3.3-19.1">An overall process of returning content that satisfies the
          constraints imposed by the Interest, most notably a match in the
          provided <xref target="name" format="none" sectionFormat="of" derivedContent="">Name</xref>.</li>
        </ul>
        <t pn="section-3.3-20"><strong>Interest Match in FIB (longest prefix match):</strong></t>
        <ul empty="true" spacing="normal" bare="false" pn="section-3.3-21">
          <li pn="section-3.3-21.1">A process of finding a FIB entry with the longest <xref target="name" format="none" sectionFormat="of" derivedContent="">Name</xref> (in terms
          of <xref target="name_component" format="none" sectionFormat="of" derivedContent="">Name components</xref>) that is a prefix of the specified Name. See
          <xref target="terms-related-to-name-types" format="default" sectionFormat="of" derivedContent="Section 3.5"/> for
          terms related to name prefixes.</li>
        </ul>
        <t pn="section-3.3-22"><strong>Interest Match in PIT (exact match):</strong></t>
        <ul empty="true" spacing="normal" bare="false" pn="section-3.3-23">
          <li pn="section-3.3-23.1">A process of finding a PIT entry that stores the same <xref target="name" format="none" sectionFormat="of" derivedContent="">Name</xref> as
          specified in the Interest (including Interest restrictions, if
          any).</li>
        </ul>
        <t pn="section-3.3-24"><strong>Data Match in PIT (all match):</strong></t>
        <ul empty="true" spacing="normal" bare="false" pn="section-3.3-25">
          <li pn="section-3.3-25.1">A process of finding (a set of) PIT entries that can be
	  satisfied with the specified <xref target="data_packet" format="none" sectionFormat="of" derivedContent="">Data packet</xref>.</li>
        </ul>
        <t pn="section-3.3-26"><strong>Interest Match in CS (any match):</strong></t>
        <ul empty="true" spacing="normal" bare="false" pn="section-3.3-27">
          <li pn="section-3.3-27.1">A process of finding an entry in a router's <xref target="content_store" format="none" sectionFormat="of" derivedContent="">Content Store</xref> that
          can satisfy the specified Interest.</li>
        </ul>
        <t pn="section-3.3-28"><strong>Pending Interest Table (PIT):</strong></t>
        <ul empty="true" spacing="normal" bare="false" pn="section-3.3-29">
          <li pn="section-3.3-29.1">A database that records received and not-yet-satisfied Interests
          with the interfaces from where they were received. The PIT can also
          store interfaces to where Interests were forwarded, and information
          to assess data-plane performance. Interests for the same Data are
          aggregated into a single PIT entry.</li>
        </ul>
        <t pn="section-3.3-30"><strong>Forwarding Information Base (FIB):</strong></t>
        <ul empty="true" spacing="normal" bare="false" pn="section-3.3-31">
          <li pn="section-3.3-31.1">A database that contains a set of prefixes, each prefix
          associated with one or more faces that can be used to retrieve <xref target="data_packet" format="none" sectionFormat="of" derivedContent="">Data packets</xref> with <xref target="name" format="none" sectionFormat="of" derivedContent="">Names</xref> under the corresponding prefix. The list
          of faces for each prefix can be ranked, and each face may be
          associated with additional information to facilitate
          forwarding-strategy decisions.</li>
        </ul>
        <t anchor="content_store" pn="section-3.3-32"><strong>Content Store (CS):</strong></t>
        <ul empty="true" spacing="normal" bare="false" pn="section-3.3-33">
          <li pn="section-3.3-33.1">A database in an ICN router that provides caching.</li>
        </ul>
        <t pn="section-3.3-34"><strong>In-Network Storage:</strong></t>
        <ul empty="true" spacing="normal" bare="false" pn="section-3.3-35">
          <li pn="section-3.3-35.1">An optional process of storing a <xref target="data_packet" format="none" sectionFormat="of" derivedContent="">Data packet</xref> within the network (opportunistic
          caches, dedicated on/off path caches, and managed in-network storage
          systems), so it can satisfy an incoming Interest for this Data
          packet. The in-network storages can optionally advertise the stored
          Data packets in the routing plane.</li>
        </ul>
        <t pn="section-3.3-36"><strong>Opportunistic Caching:</strong></t>
        <ul empty="true" spacing="normal" bare="false" pn="section-3.3-37">
          <li pn="section-3.3-37.1">A process of temporarily storing a forwarded <xref target="data_packet" format="none" sectionFormat="of" derivedContent="">Data packet</xref> in the
          router's memory (RAM or disk), so it can be used to satisfy future
          Interests for the same Data, if any.</li>
        </ul>
        <ul empty="true" spacing="normal" bare="false" pn="section-3.3-38">
          <li pn="section-3.3-38.1">
            <ul empty="true" spacing="normal" bare="false" pn="section-3.3-38.1.1">
              <li pn="section-3.3-38.1.1.1">Common aliases include: on-path in-network caching.</li>
            </ul>
          </li>
        </ul>
        <t pn="section-3.3-39"><strong>Managed Caching:</strong></t>
        <ul empty="true" spacing="normal" bare="false" pn="section-3.3-40">
          <li pn="section-3.3-40.1">The process of achieving the temporary, permanent, or scheduled
      storage of a selected (set of) <xref target="data_packet" format="none" sectionFormat="of" derivedContent="">Data packet(s)</xref>.</li>
        </ul>
        <ul empty="true" spacing="normal" bare="false" pn="section-3.3-41">
          <li pn="section-3.3-41.1">
            <ul empty="true" spacing="normal" bare="false" pn="section-3.3-41.1.1">
              <li pn="section-3.3-41.1.1.1">Common aliases include: off-path in-network storage.</li>
            </ul>
          </li>
        </ul>
        <t pn="section-3.3-42"><strong>Managed In-Network Storage:</strong></t>
        <ul empty="true" spacing="normal" bare="false" pn="section-3.3-43">
          <li pn="section-3.3-43.1">An entity acting as an ICN publisher that implements managed caching.</li>
        </ul>
        <ul empty="true" spacing="normal" bare="false" pn="section-3.3-44">
          <li pn="section-3.3-44.1">
            <ul empty="true" spacing="normal" bare="false" pn="section-3.3-44.1.1">
              <li pn="section-3.3-44.1.1.1">Common aliases include: repository, repo.</li>
            </ul>
          </li>
        </ul>
        <t pn="section-3.3-45"><strong>ICN Routing Plane:</strong></t>
        <ul empty="true" spacing="normal" bare="false" pn="section-3.3-46">
          <li pn="section-3.3-46.1">An ICN protocol or a set of ICN protocols to exchange
          information about <xref target="name" format="none" sectionFormat="of" derivedContent="">Name</xref> space reachability.</li>
        </ul>
        <t pn="section-3.3-47"><strong>ICN Routing Information Base (RIB):</strong></t>
        <ul empty="true" spacing="normal" bare="false" pn="section-3.3-48">
          <li pn="section-3.3-48.1">A database that contains a set of prefix-face mappings that are produced by running one or multiple routing protocols. The RIB is used to populate the FIB.</li>
        </ul>
      </section>
      <section anchor="terms-related-to-packet-types" numbered="true" toc="include" removeInRFC="false" pn="section-3.4">
        <name slugifiedName="name-terms-related-to-packet-typ">Terms Related to Packet Types</name>
        <t anchor="interest_packet" pn="section-3.4-1"><strong>Interest Packet:</strong></t>
        <ul empty="true" spacing="normal" bare="false" pn="section-3.4-2">
          <li pn="section-3.4-2.1">A network-level packet that expresses the request for a <xref target="data_packet" format="none" sectionFormat="of" derivedContent="">Data packet</xref> using either
          an exact name or a name prefix. An Interest packet may optionally
          carry a set of additional restrictions (e.g., Interest
          selectors). An Interest may be associated with additional
          information to facilitate forwarding and can include Interest
          lifetime, hop limit, forwarding hints, labels, etc. In different ICN
          designs, the set of additional associated information may vary.</li>
        </ul>
        <ul empty="true" spacing="normal" bare="false" pn="section-3.4-3">
          <li pn="section-3.4-3.1">
            <ul empty="true" spacing="normal" bare="false" pn="section-3.4-3.1.1">
              <li pn="section-3.4-3.1.1.1">Common aliases include: Interest, Interest message, information request.</li>
            </ul>
          </li>
        </ul>
        <t anchor="interest_nack" pn="section-3.4-4"><strong>Interest Nack:</strong></t>
        <ul empty="true" spacing="normal" bare="false" pn="section-3.4-5">
          <li pn="section-3.4-5.1">A packet that contains the <xref target="interest_packet" format="none" sectionFormat="of" derivedContent="">Interest packet</xref> and optional annotation, which is sent
          by the ICN router to the interface(s) the Interest was received
          from. An Interest Nack is used to inform downstream ICN nodes about
          the inability to forward the included Interest packet. The
          annotation can describe the reason.</li>
        </ul>
        <ul empty="true" spacing="normal" bare="false" pn="section-3.4-6">
          <li pn="section-3.4-6.1">
            <ul empty="true" spacing="normal" bare="false" pn="section-3.4-6.1.1">
              <li pn="section-3.4-6.1.1.1">Common aliases include: network NACK, Interest return.</li>
            </ul>
          </li>
        </ul>
        <t anchor="data_packet" pn="section-3.4-7"><strong>Data Packet:</strong></t>
        <ul empty="true" spacing="normal" bare="false" pn="section-3.4-8">
          <li pn="section-3.4-8.1">A network-level packet that carries payload, uniquely identified
          by a name, that is directly secured through cryptographic signature
          mechanisms.</li>
        </ul>
        <ul empty="true" spacing="normal" bare="false" pn="section-3.4-9">
          <li pn="section-3.4-9.1">
            <ul empty="true" spacing="normal" bare="false" pn="section-3.4-9.1.1">
              <li pn="section-3.4-9.1.1.1">Common aliases include: data, data object, content object, content object packet, data message, named data object, named data.</li>
            </ul>
          </li>
        </ul>
        <t anchor="link" pn="section-3.4-10"><strong>Link:</strong></t>
        <ul empty="true" spacing="normal" bare="false" pn="section-3.4-11">
          <li pn="section-3.4-11.1">A type of <xref target="data_packet" format="none" sectionFormat="of" derivedContent="">Data
          packet</xref> whose body contains the <xref target="name" format="none" sectionFormat="of" derivedContent="">Name</xref> of another Data packet. This inner Name is
          often a <xref target="full_name" format="none" sectionFormat="of" derivedContent="">Full Name</xref>,
          i.e., it specifies the Packet ID of the corresponding Data packet,
          but this is not a requirement.</li>
        </ul>
        <ul empty="true" spacing="normal" bare="false" pn="section-3.4-12">
          <li pn="section-3.4-12.1">
            <ul empty="true" spacing="normal" bare="false" pn="section-3.4-12.1.1">
              <li pn="section-3.4-12.1.1.1">Common aliases include: pointer.</li>
            </ul>
          </li>
        </ul>
        <t pn="section-3.4-13"><strong>Manifest:</strong></t>
        <ul empty="true" spacing="normal" bare="false" pn="section-3.4-14">
          <li pn="section-3.4-14.1">A type of <xref target="data_packet" format="none" sectionFormat="of" derivedContent="">Data packet</xref> that contains <xref target="full_name" format="none" sectionFormat="of" derivedContent="">Full Name</xref> <xref target="link" format="none" sectionFormat="of" derivedContent="">Links</xref> to one or
          more Data Packets. Manifests group collections of related Data
          packets under a single Name. Manifests allow both large Data objects
          to be conveniently split into individual Content Objects under one
          name, and to represent sets of related Content Objects as a form of
          "directory". Manifests have the additional benefit of amortizing the
          signature verification cost for each Data packet referenced by the
          inner <xref target="link" format="none" sectionFormat="of" derivedContent="">Links</xref>. Manifests typically contain additional metadata, e.g.,
          the size (in bytes) of each linked Data packet and the cryptographic
          hash digest of all Data contained in the linked Data packets.</li>
        </ul>
      </section>
      <section anchor="terms-related-to-name-types" numbered="true" toc="include" removeInRFC="false" pn="section-3.5">
        <name slugifiedName="name-terms-related-to-name-types">Terms Related to Name Types</name>
        <t anchor="name" pn="section-3.5-1"><strong>Name:</strong></t>
        <ul empty="true" spacing="normal" bare="false" pn="section-3.5-2">
          <li pn="section-3.5-2.1">A <xref target="data_packet" format="none" sectionFormat="of" derivedContent="">Data packet</xref>
          identifier. An ICN name is hierarchical (a sequence of name
          components) and usually is semantically meaningful, making it
          expressive, flexible, and application-specific (akin to an HTTP
          URL). A Name may encode information about application context,
          semantics, locations (topological, geographical, hyperbolic, etc.),
          a service name, etc.</li>
        </ul>
        <ul empty="true" spacing="normal" bare="false" pn="section-3.5-3">
          <li pn="section-3.5-3.1">
            <ul empty="true" spacing="normal" bare="false" pn="section-3.5-3.1.1">
              <li pn="section-3.5-3.1.1.1">Common aliases include: data name, interest name, content name.</li>
            </ul>
          </li>
        </ul>
        <t anchor="name_component" pn="section-3.5-4"><strong>Name component:</strong></t>
        <ul empty="true" spacing="normal" bare="false" pn="section-3.5-5">
          <li pn="section-3.5-5.1">A sequence of bytes and optionally a numeric type representing a single label in the hierarchical structured name.</li>
        </ul>
        <ul empty="true" spacing="normal" bare="false" pn="section-3.5-6">
          <li pn="section-3.5-6.1">
            <ul empty="true" spacing="normal" bare="false" pn="section-3.5-6.1.1">
              <li pn="section-3.5-6.1.1.1">Common aliases include: name segment (as in CCNx).</li>
            </ul>
          </li>
        </ul>
        <t pn="section-3.5-7"><strong>Packet ID:</strong></t>
        <ul empty="true" spacing="normal" bare="false" pn="section-3.5-8">
          <li pn="section-3.5-8.1">A unique cryptographic identifier for a <xref target="data_packet" format="none" sectionFormat="of" derivedContent="">Data packet</xref>. Typically,
          this is a cryptographic hash digest of a Data packet (such as SHA256
          <xref target="RFC6234" format="default" sectionFormat="of" derivedContent="RFC6234"/>), including
          its name, payload, meta information, and signature.
</li>
        </ul>
        <ul empty="true" spacing="normal" bare="false" pn="section-3.5-9">
          <li pn="section-3.5-9.1">
            <ul empty="true" spacing="normal" bare="false" pn="section-3.5-9.1.1">
              <li pn="section-3.5-9.1.1.1">Common aliases include: implicit digest.</li>
            </ul>
          </li>
        </ul>
        <t pn="section-3.5-10"><strong>Selector:</strong></t>
        <ul empty="true" spacing="normal" bare="false" pn="section-3.5-11">
          <li pn="section-3.5-11.1">A mechanism (condition) to select an individual <xref target="data_packet" format="none" sectionFormat="of" derivedContent="">Data packet</xref> from
	  a collection of Data packets that match a given Interest that
	  requests data using a prefix or exact <xref target="name" format="none" sectionFormat="of" derivedContent="">Name.</xref></li>
        </ul>
        <ul empty="true" spacing="normal" bare="false" pn="section-3.5-12">
          <li pn="section-3.5-12.1">
            <ul empty="true" spacing="normal" bare="false" pn="section-3.5-12.1.1">
              <li pn="section-3.5-12.1.1.1">Common aliases include: interest selector, restrictor, interest restrictor.</li>
            </ul>
          </li>
        </ul>
        <t pn="section-3.5-13"><strong>Nonce:</strong></t>
        <ul empty="true" spacing="normal" bare="false" pn="section-3.5-14">
          <li pn="section-3.5-14.1">A field of an <xref target="interest_packet" format="none" sectionFormat="of" derivedContent="">Interest packet</xref> that transiently names an
          Interest instance (instance of Interest for a given name). Note: the
          specifications defining nonces in NDN do not necessarily satisfy all
          the properties of nonces as discussed in <xref target="RFC4949" format="default" sectionFormat="of" derivedContent="RFC4949"/>.</li>
        </ul>
        <t pn="section-3.5-15"><strong>Exact Name:</strong></t>
        <ul empty="true" spacing="normal" bare="false" pn="section-3.5-16">
          <li pn="section-3.5-16.1">A <xref target="name" format="none" sectionFormat="of" derivedContent="">Name</xref> that is encoded inside a <xref target="data_packet" format="none" sectionFormat="of" derivedContent="">Data packet</xref> and that typically uniquely
          identifies this Data packet.</li>
        </ul>
        <t anchor="full_name" pn="section-3.5-17"><strong>Full Name:</strong></t>
        <ul empty="true" spacing="normal" bare="false" pn="section-3.5-18">
          <li pn="section-3.5-18.1">An exact <xref target="name" format="none" sectionFormat="of" derivedContent="">Name</xref> with the Packet ID of the corresponding <xref target="data_packet" format="none" sectionFormat="of" derivedContent="">Data packet</xref>.</li>
        </ul>
        <t pn="section-3.5-19"><strong>Prefix Name:</strong></t>
        <ul empty="true" spacing="normal" bare="false" pn="section-3.5-20">
          <li pn="section-3.5-20.1">A <xref target="name" format="none" sectionFormat="of" derivedContent="">Name</xref> that includes a partial sequence of Name components
	  (starting from the first one) of a Name encoded inside a <xref target="data_packet" format="none" sectionFormat="of" derivedContent="">Data packet</xref>.</li>
        </ul>
        <ul empty="true" spacing="normal" bare="false" pn="section-3.5-21">
          <li pn="section-3.5-21.1">
            <ul empty="true" spacing="normal" bare="false" pn="section-3.5-21.1.1">
              <li pn="section-3.5-21.1.1.1">Common aliases include: prefix.</li>
            </ul>
          </li>
        </ul>
      </section>
      <section anchor="terms-related-to-name-usage" numbered="true" toc="include" removeInRFC="false" pn="section-3.6">
        <name slugifiedName="name-terms-related-to-name-usage">Terms Related to Name Usage</name>
        <t pn="section-3.6-1"><strong>Naming conventions:</strong></t>
        <ul empty="true" spacing="normal" bare="false" pn="section-3.6-2">
          <li pn="section-3.6-2.1">A convention, agreement, or specification for the <xref target="data_packet" format="none" sectionFormat="of" derivedContent="">Data packet</xref> naming. a Naming convention structures a namespace.</li>
        </ul>
        <ul empty="true" spacing="normal" bare="false" pn="section-3.6-3">
          <li pn="section-3.6-3.1">
            <ul empty="true" spacing="normal" bare="false" pn="section-3.6-3.1.1">
              <li pn="section-3.6-3.1.1.1">Common aliases include: Naming scheme, ICN naming scheme, namespace convention.</li>
            </ul>
          </li>
        </ul>
        <t pn="section-3.6-4"><strong>Hierarchically structured naming:</strong></t>
        <ul empty="true" spacing="normal" bare="false" pn="section-3.6-5">
          <li pn="section-3.6-5.1">The naming scheme that assigns and interprets a <xref target="name" format="none" sectionFormat="of" derivedContent="">Name</xref> as a sequence of labels (Name components) with hierarchical structure without an assumption of a single administrative root. A structure provides useful context information for the Name.</li>
        </ul>
        <ul empty="true" spacing="normal" bare="false" pn="section-3.6-6">
          <li pn="section-3.6-6.1">
            <ul empty="true" spacing="normal" bare="false" pn="section-3.6-6.1.1">
              <li pn="section-3.6-6.1.1.1">Common aliases include: hierarchical naming, structured naming.</li>
            </ul>
          </li>
        </ul>
        <t pn="section-3.6-7"><strong>Flat naming:</strong></t>
        <ul empty="true" spacing="normal" bare="false" pn="section-3.6-8">
          <li pn="section-3.6-8.1">The naming scheme that assigns and interprets a <xref target="name" format="none" sectionFormat="of" derivedContent="">Name</xref> as a single label (Name component) without any internal structure. This can be considered a special (or degenerate) case of structured names.</li>
        </ul>
        <t pn="section-3.6-9"><strong>Segmentation:</strong></t>
        <ul empty="true" spacing="normal" bare="false" pn="section-3.6-10">
          <li pn="section-3.6-10.1">A process of splitting large application content into a set of
          uniquely named <xref target="data_packet" format="none" sectionFormat="of" derivedContent="">Data packets</xref>. When using hierarchically structured
          names, each created Data packet has a common prefix and an
          additional component representing the segment (chunk) number.</li>
        </ul>
        <ul empty="true" spacing="normal" bare="false" pn="section-3.6-11">
          <li pn="section-3.6-11.1">
            <ul empty="true" spacing="normal" bare="false" pn="section-3.6-11.1.1">
              <li pn="section-3.6-11.1.1.1">Common aliases include: chunking.</li>
            </ul>
          </li>
        </ul>
        <t pn="section-3.6-12"><strong>Versioning:</strong></t>
        <ul empty="true" spacing="normal" bare="false" pn="section-3.6-13">
          <li pn="section-3.6-13.1">A process of assigning a unique <xref target="name" format="none" sectionFormat="of" derivedContent="">Name</xref> to the revision of the content carried in
          the <xref target="data_packet" format="none" sectionFormat="of" derivedContent="">Data
          packet</xref>. When using a hierarchically structured Name, the
          version of the Data packet can be carried in a dedicated Name
          component (e.g., prefix identifies data, unique version component
          identifies the revision of the data).</li>
        </ul>
        <t pn="section-3.6-14"><strong>Fragmentation:</strong></t>
        <ul empty="true" spacing="normal" bare="false" pn="section-3.6-15">
          <li pn="section-3.6-15.1">A process of splitting PDUs into Frames so that they can be transmitted over a Layer 2 interface with a smaller MTU size.</li>
        </ul>
      </section>
      <section anchor="terms-related-to-data-centric-security" numbered="true" toc="include" removeInRFC="false" pn="section-3.7">
        <name slugifiedName="name-terms-related-to-data-centr">Terms Related to Data-Centric Security</name>
        <t pn="section-3.7-1"><strong>Data-Centric Security:</strong></t>
        <ul empty="true" spacing="normal" bare="false" pn="section-3.7-2">
          <li pn="section-3.7-2.1">A security property associated with the <xref target="data_packet" format="none" sectionFormat="of" derivedContent="">Data packet</xref>, including
          data (Data-Centric) integrity, authenticity, and optionally
          confidentiality. These security properties stay with the Data packet
          regardless of where it is stored and how it is retrieved.</li>
        </ul>
        <ul empty="true" spacing="normal" bare="false" pn="section-3.7-3">
          <li pn="section-3.7-3.1">
            <ul empty="true" spacing="normal" bare="false" pn="section-3.7-3.1.1">
              <li pn="section-3.7-3.1.1.1">Common aliases include: directly securing Data packet.</li>
            </ul>
          </li>
        </ul>
        <t pn="section-3.7-4"><strong>Data Integrity</strong></t>
        <ul empty="true" spacing="normal" bare="false" pn="section-3.7-5">
          <li pn="section-3.7-5.1">A cryptographic mechanism to ensure the consistency of the <xref target="data_packet" format="none" sectionFormat="of" derivedContent="">Data
          packet</xref> bits. The Data integrity property validates that the Data
          packet content has not been corrupted during transmission, e.g.,
          over lossy or otherwise unreliable paths, or been subject to
          deliberate modification.</li>
        </ul>
        <t pn="section-3.7-6"><strong>Data Authenticity</strong></t>
        <ul empty="true" spacing="normal" bare="false" pn="section-3.7-7">
          <li pn="section-3.7-7.1">A cryptographic mechanism to ensure trustworthiness of a <xref target="data_packet" format="none" sectionFormat="of" derivedContent="">Data
          packet</xref> based on a selected (e.g., by a consumer/producer) trust
          model. Typically, data authenticity is assured through the use of
          asymmetric cryptographic signatures (e.g., RSA, ECDSA) but can also
          be realized using symmetric signatures (e.g., Hashed Message
	  Authentication Code (HMAC)) within trusted
          domains.</li>
        </ul>
        <t pn="section-3.7-8"><strong>Data Confidentiality</strong></t>
        <ul empty="true" spacing="normal" bare="false" pn="section-3.7-9">
          <li pn="section-3.7-9.1">A cryptographic mechanism to ensure secrecy of a <xref target="data_packet" format="none" sectionFormat="of" derivedContent="">Data packet</xref>. Data
          confidentiality includes separate mechanisms: <xref target="content_confidentiality" format="none" sectionFormat="of" derivedContent="">Content
          confidentiality</xref> and <xref target="name_confidentiality" format="none" sectionFormat="of" derivedContent="">Name confidentiality</xref>.</li>
        </ul>
        <t anchor="content_confidentiality" pn="section-3.7-10"><strong>Content Confidentiality</strong></t>
        <ul empty="true" spacing="normal" bare="false" pn="section-3.7-11">
          <li pn="section-3.7-11.1">A cryptographic mechanism to prevent an unauthorized party to
          get access to the plain-text payload of a <xref target="data_packet" format="none" sectionFormat="of" derivedContent="">Data packet</xref>. Can be
          realized through encryption (symmetric, asymmetric, hybrid) and
          proper distribution of the decryption keys to authorized
          parties.</li>
        </ul>
        <t anchor="name_confidentiality" pn="section-3.7-12"><strong>Name Confidentiality</strong></t>
        <ul empty="true" spacing="normal" bare="false" pn="section-3.7-13">
          <li pn="section-3.7-13.1">A cryptographic mechanism to prevent an observer of
          Interest-Data exchanges (e.g., intermediate router) from gaining
          detailed meta information about the <xref target="data_packet" format="none" sectionFormat="of" derivedContent="">Data packet</xref>. This mechanism can
          be realized using encryption (same as content confidentiality) or
          obfuscation mechanisms.</li>
        </ul>
      </section>
    </section>
    <section anchor="semantics-and-usage" numbered="true" toc="include" removeInRFC="false" pn="section-4">
      <name slugifiedName="name-semantics-and-usage">Semantics and Usage</name>
      <t pn="section-4-1">The terminology described above is the manifestation of intended
      semantics of NDN and CCNx operations (What do we expect the network to
      do?). In this section, we summarize the most commonly proposed use cases
      and interpretations.</t>
      <section anchor="data-transfer" numbered="true" toc="include" removeInRFC="false" pn="section-4.1">
        <name slugifiedName="name-data-transfer">Data Transfer</name>
        <t pn="section-4.1-1">The networking view of NDN and CCNx is that the request/reply
        protocol implements a basic, unreliable data transfer service for
        single, named packets.</t>
      </section>
      <section anchor="data-transport" numbered="true" toc="include" removeInRFC="false" pn="section-4.2">
        <name slugifiedName="name-data-transport">Data Transport</name>
        <t pn="section-4.2-1">Data transfer can be turned into a data transport service for
        application-level objects by additional logic. This transport logic
        must understand and construct the series of names needed to reassemble
        the segmented object. Various flavors of transport can be envisaged
        (reliable, streaming, mailbox, etc.).</t>
      </section>
      <section anchor="lookup-service" numbered="true" toc="include" removeInRFC="false" pn="section-4.3">
        <name slugifiedName="name-lookup-service">Lookup Service</name>
        <t pn="section-4.3-1">In a more distributed systems view of the basic request/reply
        protocol, NDN and CCNx provide a distributed lookup service: given a
        key value (=name), the service will return the corresponding
        value.</t>
      </section>
      <section anchor="database-access" numbered="true" toc="include" removeInRFC="false" pn="section-4.4">
        <name slugifiedName="name-database-access">Database Access</name>
        <t pn="section-4.4-1">A lookup service can be turned into a database access protocol by
        using the namespace structure to specify names as access keys into a
        database. Therefore, a name prefix stands for a collection or table of
        a database, while the rest of the name specifies the query expression
        to be executed.</t>
      </section>
      <section anchor="remote-procedure-call" numbered="true" toc="include" removeInRFC="false" pn="section-4.5">
        <name slugifiedName="name-remote-procedure-call">Remote Procedure Call</name>
        <t pn="section-4.5-1">The names as defined in this document for Interests and Data can
        refer to Remote Procedure call functions, their input arguments, and
        their results. For a comprehensive view of how to construct RPC or
        other remote invocation systems, see the Association for Computing
	Machinery (ACM) ICN paper on <xref target="RICE" format="default" sectionFormat="of" derivedContent="RICE"/>. These capabilities can be further
        extended into a full distributed computing infrastructure such as
        that proposed in the ACM ICN paper <xref target="CFN" format="default" sectionFormat="of" derivedContent="CFN"/>.</t>
      </section>
      <section anchor="publish-subscribe" numbered="true" toc="include" removeInRFC="false" pn="section-4.6">
        <name slugifiedName="name-publish-subscribe">Publish/Subscribe</name>
        <t pn="section-4.6-1">The names as defined in this document for Interests and Data can
        refer to data collections to be subscribed and individual data objects
        to be published in a Publish-Subscribe application architecture.  For
        a fully worked example of how to construct such an ICN-based system,
        see the ACM ICN paper <xref target="LESSONS-LEARNED" format="default" sectionFormat="of" derivedContent="LESSONS-LEARNED"/>.</t>
      </section>
    </section>
    <section anchor="iana-considerations" numbered="true" toc="include" removeInRFC="false" pn="section-5">
      <name slugifiedName="name-iana-considerations">IANA Considerations</name>
      <t pn="section-5-1">This document has no IANA actions.</t>
    </section>
    <section anchor="security-considerations" numbered="true" toc="include" removeInRFC="false" pn="section-6">
      <name slugifiedName="name-security-considerations">Security Considerations</name>
      <t pn="section-6-1">While the terms defined in this specification do not in and of
      themselves present new security considerations, the architectures that
      utilize the terms most certainly do. Readers should look at those
      specifications (e.g., <xref target="RFC8569" format="default" sectionFormat="of" derivedContent="RFC8569"/> and <xref target="NDN" format="default" sectionFormat="of" derivedContent="NDN"/>) where various security considerations
      are addressed in detail.</t>
      <t pn="section-6-2">Some of the terms in this document use the words "trust",
      "trustworthy", or "trust model". We intend that these have their
      colloquial meanings; however, much work on trust, and specifically on
      trust schemas for ICN architectures, has been published in the last few
      years. For example, it is useful to look at <xref target="SCHEMATIZING-TRUST" format="default" sectionFormat="of" derivedContent="SCHEMATIZING-TRUST"/> for more information on
      the approaches taken to formalize notions of trust for current NDN and
      CCNx systems.</t>
    </section>
  </middle>
  <back>
    <references pn="section-7">
      <name slugifiedName="name-references">References</name>
      <references pn="section-7.1">
        <name slugifiedName="name-normative-references">Normative References</name>
        <reference anchor="CFN" target="https://dl.acm.org/citation.cfm?id=3357395" quoteTitle="true" derivedAnchor="CFN">
          <front>
            <title>Compute First Networking: Distributed Computing meets ICN</title>
            <seriesInfo name="DOI" value="10.1145/3357150.3357395"/>
            <author surname="Krol" initials="M."/>
            <author surname="Mastorakis" initials="S."/>
            <author surname="Kutscher" initials="D."/>
            <author surname="Oran" initials="D."/>
            <date month="September" year="2019"/>
          </front>
          <refcontent>ACM ICN
</refcontent>
        </reference>
        <reference anchor="LESSONS-LEARNED" target="https://dl.acm.org/citation.cfm?id=3357397" quoteTitle="true" derivedAnchor="LESSONS-LEARNED">
          <front>
            <title>Lessons Learned Building a Secure Network Measurement Framework using Basic NDN</title>
            <seriesInfo name="DOI" value="10.1145/3357150.3357397"/>
            <author surname="Nichols" initials="K"/>
            <date month="September" year="2019"/>
          </front>
          <refcontent>ACM ICN
</refcontent>
        </reference>
        <reference anchor="MOBILITY-FIRST" target="https://dl.acm.org/citation.cfm?id=2412098" quoteTitle="true" derivedAnchor="MOBILITY-FIRST">
          <front>
            <title>MobilityFirst: a robust and trustworthy mobility-centric architecture for the future internet</title>
            <seriesInfo name="DOI" value="10.1145/2412096.2412098"/>
            <author surname="Raychaudhuri" initials="D."/>
            <author surname="Nagaraja" initials="K."/>
            <author surname="Venkataramani" initials="A."/>
            <date year="2012" month="July"/>
          </front>
          <refcontent>ACM SIGMOBILE
</refcontent>
          <refcontent>Volume 16, Issue 3
</refcontent>
        </reference>
        <reference anchor="NDNTLV" target="https://named-data.net/doc/ndn-tlv/" quoteTitle="true" derivedAnchor="NDNTLV">
          <front>
            <title>NDN Packet Format Specification</title>
            <author>
              <organization showOnFrontPage="true">Named Data Networking</organization>
            </author>
          </front>
        </reference>
        <reference anchor="NETINF" target="https://dl.acm.org/citation.cfm?id=2459643" quoteTitle="true" derivedAnchor="NETINF">
          <front>
            <title>Network of Information (NetInf) - An information-centric networking architecture</title>
            <seriesInfo name="DOI" value="10.1016/j.comcom.2013.01.009"/>
            <author surname="Dannewitz" initials="C."/>
            <author surname="Kutscher" initials="D."/>
            <author surname="Ohlman" initials="B."/>
            <author surname="Farrell" initials="S."/>
            <author surname="Ahlgren" initials="B."/>
            <author surname="Holger" initials="K."/>
            <date year="2013" month="April"/>
          </front>
          <refcontent>Computer Communications
</refcontent>
          <refcontent>Volume 36, Issue 7
</refcontent>
        </reference>
        <reference anchor="PSIRP" target="http://www.psirp.org/files/Deliverables/PSIRP-TR08-0001_Vision.pdf" quoteTitle="true" derivedAnchor="PSIRP">
          <front>
            <title>From Design for Tussle to Tussle Networking: PSIRP Vision and Use Cases</title>
            <author surname="Trossen" initials="D."/>
            <author surname="Tuononen" initials="J"/>
            <author surname="Xylomenos" initials="G."/>
            <author surname="Sarela" initials="M."/>
            <author surname="Zahemszky" initials="A."/>
            <author surname="Nikander" initials="P."/>
            <author surname="Rinta-aho" initials="T."/>
            <date month="May" year="2008"/>
          </front>
        </reference>
        <reference anchor="RICE" target="https://dx.doi.org/10.1145/3267955.3267956" quoteTitle="true" derivedAnchor="RICE">
          <front>
            <title>RICE: remote method invocation in ICN</title>
            <seriesInfo name="DOI" value="10.1145/3267955.3267956"/>
            <author surname="Krol" initials="M."/>
            <author surname="Habak" initials="K."/>
            <author surname="Kutscher" initials="D."/>
            <author surname="Oran" initials="D."/>
            <author surname="Psaras" initials="I."/>
            <date month="September" year="2018"/>
          </front>
          <refcontent>ACM ICN
</refcontent>
        </reference>
        <reference anchor="SCHEMATIZING-TRUST" target="https://dx.doi.org/10.1145/2810156.2810170" quoteTitle="true" derivedAnchor="SCHEMATIZING-TRUST">
          <front>
            <title>Schematizing Trust in Named Data Networking</title>
            <seriesInfo name="DOI" value="0.1145/2810156.2810170"/>
            <author surname="Yu" initials="Y."/>
            <author surname="Afanasyev" initials="A."/>
            <author surname="Clark" initials="D."/>
            <author surname="Claffy" initials="K. C."/>
            <author surname="Jacobson" initials="V."/>
            <author surname="Zhang" initials="L."/>
            <date month="September" year="2015"/>
          </front>
          <refcontent>ACM ICN
</refcontent>
        </reference>
      </references>
      <references pn="section-7.2">
        <name slugifiedName="name-informative-references">Informative References</name>
        <reference anchor="NDN" target="https://named-data.net/project/execsummary/" quoteTitle="true" derivedAnchor="NDN">
          <front>
            <title>Named Data Networking: Executive Summary</title>
            <author>
              <organization showOnFrontPage="true">Named Data Networking</organization>
            </author>
            <date month="September" year="2010"/>
          </front>
        </reference>
        <reference anchor="RFC4838" target="https://www.rfc-editor.org/info/rfc4838" quoteTitle="true" derivedAnchor="RFC4838">
          <front>
            <title>Delay-Tolerant Networking Architecture</title>
            <author initials="V." surname="Cerf" fullname="V. Cerf">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="S." surname="Burleigh" fullname="S. Burleigh">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="A." surname="Hooke" fullname="A. Hooke">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="L." surname="Torgerson" fullname="L. Torgerson">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="R." surname="Durst" fullname="R. Durst">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="K." surname="Scott" fullname="K. Scott">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="K." surname="Fall" fullname="K. Fall">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="H." surname="Weiss" fullname="H. Weiss">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2007" month="April"/>
            <abstract>
              <t>This document describes an architecture for delay-tolerant and disruption-tolerant networks, and is an evolution of the architecture originally designed for the Interplanetary Internet, a communication system envisioned to provide Internet-like services across interplanetary distances in support of deep space exploration.  This document describes an architecture that addresses a variety of problems with internetworks having operational and performance characteristics that make conventional (Internet-like) networking approaches either unworkable or impractical.  We define a message- oriented overlay that exists above the transport (or other) layers of the networks it interconnects.  The document presents a motivation for the architecture, an architectural overview, review of state management required for its operation, and a discussion of application design issues.  This document represents the consensus of the IRTF DTN research group and has been widely reviewed by that group.  This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4838"/>
          <seriesInfo name="DOI" value="10.17487/RFC4838"/>
        </reference>
        <reference anchor="RFC4949" target="https://www.rfc-editor.org/info/rfc4949" quoteTitle="true" derivedAnchor="RFC4949">
          <front>
            <title>Internet Security Glossary, Version 2</title>
            <author initials="R." surname="Shirey" fullname="R. Shirey">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2007" month="August"/>
            <abstract>
              <t>This Glossary provides definitions, abbreviations, and explanations of terminology for information system security. The 334 pages of entries offer recommendations to improve the comprehensibility of written material that is generated in the Internet Standards Process (RFC 2026). The recommendations follow the principles that such writing should (a) use the same term or definition whenever the same concept is mentioned; (b) use terms in their plainest, dictionary sense; (c) use terms that are already well-established in open publications; and (d) avoid terms that either favor a particular vendor or favor a particular technology or mechanism over other, competing techniques that already exist or could be developed.  This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="FYI" value="36"/>
          <seriesInfo name="RFC" value="4949"/>
          <seriesInfo name="DOI" value="10.17487/RFC4949"/>
        </reference>
        <reference anchor="RFC6234" target="https://www.rfc-editor.org/info/rfc6234" quoteTitle="true" derivedAnchor="RFC6234">
          <front>
            <title>US Secure Hash Algorithms (SHA and SHA-based HMAC and HKDF)</title>
            <author initials="D." surname="Eastlake 3rd" fullname="D. Eastlake 3rd">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="T." surname="Hansen" fullname="T. Hansen">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2011" month="May"/>
            <abstract>
              <t>Federal Information Processing Standard, FIPS</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6234"/>
          <seriesInfo name="DOI" value="10.17487/RFC6234"/>
        </reference>
        <reference anchor="RFC8569" target="https://www.rfc-editor.org/info/rfc8569" quoteTitle="true" derivedAnchor="RFC8569">
          <front>
            <title>Content-Centric Networking (CCNx) Semantics</title>
            <author initials="M." surname="Mosko" fullname="M. Mosko">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="I." surname="Solis" fullname="I. Solis">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="C." surname="Wood" fullname="C. Wood">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2019" month="July"/>
            <abstract>
              <t>This document describes the core concepts of the Content-Centric Networking (CCNx) architecture and presents a network protocol based on two messages: Interests and Content Objects.  It specifies the set of mandatory and optional fields within those messages and describes their behavior and interpretation.  This architecture and protocol specification is independent of a specific wire encoding.</t>
              <t>The protocol also uses a control message called an Interest Return, whereby one system can return an Interest message to the previous hop due to an error condition.  This indicates to the previous hop that the current system will not respond to the Interest.</t>
              <t>This document is a product of the Information-Centric Networking Research Group (ICNRG).  The document received wide review among ICNRG participants.  Two full implementations are in active use and have informed the technical maturity of the protocol specification.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8569"/>
          <seriesInfo name="DOI" value="10.17487/RFC8569"/>
        </reference>
        <reference anchor="RFC8609" target="https://www.rfc-editor.org/info/rfc8609" quoteTitle="true" derivedAnchor="RFC8609">
          <front>
            <title>Content-Centric Networking (CCNx) Messages in TLV Format</title>
            <author initials="M." surname="Mosko" fullname="M. Mosko">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="I." surname="Solis" fullname="I. Solis">
              <organization showOnFrontPage="true"/>
            </author>
            <author initials="C." surname="Wood" fullname="C. Wood">
              <organization showOnFrontPage="true"/>
            </author>
            <date year="2019" month="July"/>
            <abstract>
              <t>Content-Centric Networking (CCNx) is a network protocol that uses a hierarchical name to forward requests and to match responses to requests.  This document specifies the encoding of CCNx messages in a TLV packet format, including the TLV types used by each message element and the encoding of each value.  The semantics of CCNx messages follow the encoding-independent CCNx Semantics specification.</t>
              <t>This document is a product of the Information Centric Networking research group (ICNRG).  The document received wide review among ICNRG participants and has two full implementations currently in active use, which have informed the technical maturity of the protocol specification.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8609"/>
          <seriesInfo name="DOI" value="10.17487/RFC8609"/>
        </reference>
      </references>
    </references>
    <section anchor="acknowledgements" numbered="false" toc="include" removeInRFC="false" pn="section-appendix.a">
      <name slugifiedName="name-acknowledgments">Acknowledgments</name>
      <t pn="section-appendix.a-1"><contact fullname="Marc Mosko"/> provided much guidance and helpful
      precision in getting these terms carefully formed and the definitions
      precise. <contact fullname="Marie-Jose Montpetit"/> did a thorough IRSG review, which helped a
      lot to improve the text. Further comments during the IRSG Poll from
      <contact fullname="Stephen Farrell"/>, <contact fullname="Ari       Keraenen"/>, <contact fullname="Spencer Dawkins"/>, <contact fullname="Carsten Bormann"/>, and
      <contact fullname="Brian Trammell"/> further improved the document. Additional helpful
      comments were received as part of the IESG conflict review from <contact fullname="Mirja       Kuehlewind"/> and <contact fullname="Benjamin Kaduk"/>.</t>
    </section>
    <section anchor="authors-addresses" numbered="false" removeInRFC="false" toc="include" pn="section-appendix.b">
      <name slugifiedName="name-authors-addresses">Authors' Addresses</name>
      <author fullname="Bastiaan Wissingh" initials="B." surname="Wissingh">
        <organization showOnFrontPage="true">TNO</organization>
        <address>
          <email>bastiaan.wissingh@tno.nl</email>
        </address>
      </author>
      <author fullname="Christopher A. Wood" initials="C." surname="Wood">
        <organization showOnFrontPage="true">University of California Irvine</organization>
        <address>
          <email>caw@heapingbits.net</email>
        </address>
      </author>
      <author fullname="Alex Afanasyev" initials="A." surname="Afanasyev">
        <organization showOnFrontPage="true">Florida International University</organization>
        <address>
          <email>aa@cs.fiu.edu</email>
        </address>
      </author>
      <author fullname="Lixia Zhang" initials="L." surname="Zhang">
        <organization showOnFrontPage="true">UCLA</organization>
        <address>
          <email>lixia@cs.ucla.edu</email>
        </address>
      </author>
      <author fullname="David Oran" initials="D." surname="Oran">
        <organization showOnFrontPage="true">Network Systems Research &amp; Design</organization>
        <address>
          <email>daveoran@orandom.net</email>
        </address>
      </author>
      <author fullname="Christian Tschudin" initials="C." surname="Tschudin">
        <organization showOnFrontPage="true">University of Basel</organization>
        <address>
          <email>christian.tschudin@unibas.ch</email>
        </address>
      </author>
    </section>
  </back>
</rfc>
