Content centric networking

Content-Centric Networking (CCN) diverges from the IP-based, host-oriented Internet architecture by prioritizing content, making it directly addressable and routable.

In this paradigm, connectivity may well be intermittent, end-host and in-network storage can be capitalized upon transparently, as bits in the network and on data storage devices have exactly the same value, mobility and multi access are the norm and anycast, multicast, and broadcast are natively supported.

Data becomes independent from location, application, storage, and means of transportation, enabling in-network caching and replication.

The expected benefits are improved efficiency, better scalability with respect to information/bandwidth demand and better robustness in challenging communication scenarios.

On August 30, 2006, PARC Research Fellow Van Jacobson gave a talk titled "A new way to look at Networking" at Google.

The original CCN design was described in a paper published at the International Conference on Emerging Networking EXperiments and Technologies (CoNEXT) in December 2009.

The specifications included: Seamless data integration within an open-run environment was proposed as a major contributing factor in protecting the security of cloud-based analytics and key network encryption.

[10] The driving force in adopting these heuristics was twofold: Batch-interrupted data streams remaining confined to an optimal run environment, and secure shared cloud access depending upon integrative analytic processes.

Since those early days, there have been fundamental changes in the way the Internet is used — from the proliferation of social networking services to viewing and sharing digital content such as videos, photographs, documents, etc.

The Internet of Things (IoT) and sensor networks are environments where the source-destination communication model doesn't always provide the best solution.

CCN aims to be: Content Object messages are named payloads that are network-sized chunks of data.

This essentially enables shared network encryption algorithms to employ role-based access limitations to users based on defined authorization levels.