{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,23]],"date-time":"2026-01-23T18:19:38Z","timestamp":1769192378359,"version":"3.49.0"},"reference-count":29,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2014,7,28]],"date-time":"2014-07-28T00:00:00Z","timestamp":1406505600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGCOMM Comput. Commun. Rev."],"published-print":{"date-parts":[[2014,7,28]]},"abstract":"<jats:p>Motivated by limitations in today's host-centric IP network, recent studies have proposed clean-slate network architectures centered around alternate first-class principals, such as content, services, or users. However, muchlike the host-centric IP design, elevating one principal type above others hinders communication between other principals and inhibits the network's capability to evolve. This paper presents the eXpressive Internet Architecture (XIA), an architecture with native support for multiple principals and the ability to evolve its functionality to accommodate new, as yet unforeseen, principals over time. We present the results of our ongoing research motivated by and building on the XIA architecture, ranging from topics at the physical level (``how fast can XIA go'') up through to the user level.<\/jats:p>","DOI":"10.1145\/2656877.2656885","type":"journal-article","created":{"date-parts":[[2014,8,1]],"date-time":"2014-08-01T20:13:24Z","timestamp":1406924004000},"page":"50-57","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":40,"title":["XIA"],"prefix":"10.1145","volume":"44","author":[{"given":"David","family":"Naylor","sequence":"first","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"given":"Matthew K.","family":"Mukerjee","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"given":"Patrick","family":"Agyapong","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"given":"Robert","family":"Grandl","sequence":"additional","affiliation":[{"name":"University of Wisconsin, Madison, WI, USA"}]},{"given":"Ruogu","family":"Kang","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"given":"Michel","family":"Machado","sequence":"additional","affiliation":[{"name":"Boston University, Boston, MA, USA"}]},{"given":"Stephanie","family":"Brown","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"given":"Cody","family":"Doucette","sequence":"additional","affiliation":[{"name":"Boston University, Boston, MA, USA"}]},{"given":"Hsu-Chun","family":"Hsiao","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"given":"Dongsu","family":"Han","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"given":"Tiffany Hyun-Jin","family":"Kim","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"given":"Hyeontaek","family":"Lim","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"given":"Carol","family":"Ovon","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"given":"Dong","family":"Zhou","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"given":"Soo Bum","family":"Lee","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"given":"Yue-Hsun","family":"Lin","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"given":"Colleen","family":"Stuart","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"given":"Daniel","family":"Barrett","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"given":"Aditya","family":"Akella","sequence":"additional","affiliation":[{"name":"University of Wisconsin, Madison, WI, USA"}]},{"given":"David","family":"Andersen","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"given":"John","family":"Byers","sequence":"additional","affiliation":[{"name":"Boston University, Boston, MA, USA"}]},{"given":"Laura","family":"Dabbish","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"given":"Michael","family":"Kaminsky","sequence":"additional","affiliation":[{"name":"Intel, Pittssburgh, PA, USA"}]},{"given":"Sara","family":"Kiesler","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"given":"Jon","family":"Peha","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"given":"Adrian","family":"Perrig","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"given":"Srinivasan","family":"Seshan","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"given":"Marvin","family":"Sirbu","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"given":"Peter","family":"Steenkiste","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]}],"member":"320","published-online":{"date-parts":[[2014,7,28]]},"reference":[{"key":"e_1_2_1_2_1","volume-title":"Economic Incentives in Content-Centric Networking: Implications for Protocol Design and Public Policy","author":"Agyapong P.","year":"2012","unstructured":"P. Agyapong and M. Sirbu . Economic Incentives in Content-Centric Networking: Implications for Protocol Design and Public Policy . IEEE Communications Magazine, Special Issue on CCNs , December 2012 . P. Agyapong and M. Sirbu. Economic Incentives in Content-Centric Networking: Implications for Protocol Design and Public Policy. IEEE Communications Magazine, Special Issue on CCNs, December 2012."},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2070562.2070564"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1402958.1402997"},{"key":"e_1_2_1_5_1","volume-title":"Proceedings of ACM HotNets","author":"Argyraki K.","year":"2005","unstructured":"K. Argyraki and D. R. Cheriton . Network capabilities: The good, the bad and the ugly . In Proceedings of ACM HotNets , 2005 . K. Argyraki and D. R. Cheriton. Network capabilities: The good, the bad and the ugly. In Proceedings of ACM HotNets, 2005."},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1232919.1232926"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/633025.633059"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251375.1251396"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2413176.2413179"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/347059.347397"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-012-0898-6"},{"key":"e_1_2_1_13_1","volume-title":"Proceedings of the 9th Usenix Symposium on Networked Systems Design and Implementation, NSDI 2012","author":"Han D.","year":"2012","unstructured":"D. Han , A. Anand , F. Dogar , B. Li , H. Lim , M. Machado , A. Mukundan , W. Wu , A. Akella , D. G. Andersen , J. W. Byers , S. Seshan , and P. Steenkiste . XIA: Efficient Support for Evolvable Internetworking . In Proceedings of the 9th Usenix Symposium on Networked Systems Design and Implementation, NSDI 2012 , 2012 . D. Han, A. Anand, F. Dogar, B. Li, H. Lim, M. Machado, A. Mukundan, W. Wu, A. Akella, D. G. Andersen, J. W. Byers, S. Seshan, and P. Steenkiste. XIA: Efficient Support for Evolvable Internetworking. In Proceedings of the 9th Usenix Symposium on Networked Systems Design and Implementation, NSDI 2012, 2012."},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2486001.2486004"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.37"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2484313.2484367"},{"key":"e_1_2_1_17_1","volume-title":"February","author":"Huitema C.","year":"2006","unstructured":"C. Huitema . Teredo: Tunneling IPv6 over UDP through Network Address Translations (NATs). RFC 4380 (Proposed Standard) , February 2006 . Updated by RFCs 5991, 6081. C. Huitema. Teredo: Tunneling IPv6 over UDP through Network Address Translations (NATs). RFC 4380 (Proposed Standard), February 2006. Updated by RFCs 5991, 6081."},{"key":"e_1_2_1_18_1","volume-title":"ACM Conference on Human Factors in Computing Systems (CHI13)","author":"Kang R.","year":"2013","unstructured":"R. Kang , S. Brown , and S. Kiesler . Users' Perception about Internet Anonymity . In ACM Conference on Human Factors in Computing Systems (CHI13) , April 2013 . R. Kang, S. Brown, and S. Kiesler. Users' Perception about Internet Anonymity. In ACM Conference on Human Factors in Computing Systems (CHI13), April 2013."},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/633025.633035"},{"key":"e_1_2_1_20_1","first-page":"257","volume-title":"Explicit congestion control: charging, fairness and admission management","author":"Kelly F.","year":"2010","unstructured":"F. Kelly and G. Raina . Explicit congestion control: charging, fairness and admission management . In B. Ramamurthy, G. N. Rouskas, and K. M. Sivalingam, editors, Next-Generation Internet Architectures and Protocols, pages 257 -- 274 . Cambridge University Press , 2010 . F. Kelly and G. Raina. Explicit congestion control: charging, fairness and admission management. In B. Ramamurthy, G. N. Rouskas, and K. M. Sivalingam, editors, Next-Generation Internet Architectures and Protocols, pages 257--274. Cambridge University Press, 2010."},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/354871.354874"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2535372.2535396"},{"key":"e_1_2_1_23_1","volume-title":"October","author":"Nordmark E.","year":"2005","unstructured":"E. Nordmark and R. Gilligan . Basic Transition Mechanisms for IPv6 Hosts and Routers. RFC 4213 (Proposed Standard) , October 2005 . E. Nordmark and R. Gilligan. Basic Transition Mechanisms for IPv6 Hosts and Routers. RFC 4213 (Proposed Standard), October 2005."},{"key":"e_1_2_1_24_1","volume-title":"Proc. 9th Symposium on Networked Systems Design and Implementation, NSDI '12","author":"Nordstrom E.","year":"2012","unstructured":"E. Nordstrom , D. Shue , P. Gopalan , R. Kiefer , M. Arye , S. Ko , J. Rexford , and M. J. Freedman . Serval: An end-host stack for service-centric networking . In Proc. 9th Symposium on Networked Systems Design and Implementation, NSDI '12 , 2012 . E. Nordstrom, D. Shue, P. Gopalan, R. Kiefer, M. Arye, S. Ko, J. Rexford, and M. J. Freedman. Serval: An end-host stack for service-centric networking. In Proc. 9th Symposium on Networked Systems Design and Implementation, NSDI '12, 2012."},{"key":"e_1_2_1_25_1","volume-title":"September","author":"Rainie L.","year":"2013","unstructured":"L. Rainie , S. Kiesler , R. Kang , and M. Madden . Anonymity, Privacy, and Security Online , September 2013 . Pew Research Internet Project , http:\/\/pewinternet.org\/Reports\/2013\/Anonymity-online.aspx. L. Rainie, S. Kiesler, R. Kang, and M. Madden. Anonymity, Privacy, and Security Online, September 2013. Pew Research Internet Project, http:\/\/pewinternet.org\/Reports\/2013\/Anonymity-online.aspx."},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/1813084.1813088"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1764873.1764878"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1658939.1658941"},{"key":"e_1_2_1_29_1","first-page":"6301","author":"Zhu Z.","year":"2011","unstructured":"Z. Zhu and R. Wakikawa and L. Zhang . A Survey of Mobility Support in the Internet , July 2011 . IETF RFC 6301 . Z. Zhu and R. Wakikawa and L. Zhang. A Survey of Mobility Support in the Internet, July 2011. IETF RFC 6301.","journal-title":"A Survey of Mobility Support in the Internet"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.45"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2535372.2535379"}],"container-title":["ACM SIGCOMM Computer Communication Review"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2656877.2656885","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2656877.2656885","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:19:43Z","timestamp":1750231183000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2656877.2656885"}},"subtitle":["architecting a more trustworthy and evolvable internet"],"short-title":[],"issued":{"date-parts":[[2014,7,28]]},"references-count":29,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2014,7,28]]}},"alternative-id":["10.1145\/2656877.2656885"],"URL":"https:\/\/doi.org\/10.1145\/2656877.2656885","relation":{},"ISSN":["0146-4833"],"issn-type":[{"value":"0146-4833","type":"print"}],"subject":[],"published":{"date-parts":[[2014,7,28]]},"assertion":[{"value":"2014-07-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}