<?xml version="1.0" encoding="UTF-8"?>
<reference anchor="I-D.pentikousis-icn-scenarios" target="https://datatracker.ietf.org/doc/html/draft-pentikousis-icn-scenarios-04">
   <front>
      <title>ICN Baseline Scenarios and Evaluation Methodology</title>
      <author initials="K." surname="Pentikousis" fullname="Kostas Pentikousis">
         <organization>Huawei Technologies</organization>
      </author>
      <author initials="B." surname="Ohlman" fullname="Börje Ohlman">
         <organization>Ericsson</organization>
      </author>
      <author initials="D." surname="Corujo" fullname="Daniel Corujo">
         <organization>Universidade de Aveiro</organization>
      </author>
      <author initials="G." surname="Boggia" fullname="Gennaro Boggia">
         <organization>Politecnico di Bari</organization>
      </author>
      <author initials="G." surname="Tyson" fullname="Gareth Tyson">
         <organization>Queen Mary</organization>
      </author>
      <author initials="E. B." surname="Davies" fullname="Elwyn B. Davies">
         <organization>Trinity College Dublin</organization>
      </author>
      <author initials="P." surname="Mahadevan" fullname="Priya Mahadevan">
         <organization>PARC</organization>
      </author>
      <author initials="S." surname="Spirou" fullname="Spiros Spirou">
         <organization>Intracom Telecom</organization>
      </author>
      <author initials="A." surname="Molinaro" fullname="Antonella Molinaro">
         <organization>UNIRC</organization>
      </author>
      <author initials="D." surname="Gellert" fullname="Dorothy Gellert">
         <organization>InterDigital</organization>
      </author>
      <author initials="S." surname="Eum" fullname="Suyong Eum">
         <organization>NICT</organization>
      </author>
      <date month="July" day="15" year="2013" />
      <abstract>
	 <t>   This document aims at establishing a common understanding about the
   evaluation of different information-centric networking (ICN)
   approaches so that they can be tested and compared against each other
   while showcasing their own advantages.  Towards this end, we review
   the ICN literature and document scenarios which have been considered
   in previous performance evaluation studies.  We discuss a variety of
   aspects that an ICN solution can address.  This includes general
   aspects, such as, network efficiency, reduced complexity, increased
   scalability and reliability, mobility support, multicast and caching
   performance, real-time communication efficacy, energy consumption
   frugality, and disruption and delay tolerance.  We detail ICN-
   specific aspects as well, such as information security and trust,
   persistence, availability, provenance, and location independence.  We
   then survey the evaluation tools currently available to researchers
   in this area and provide suggestions regarding methodology and
   metrics.  Finally, this document sheds some light on the impact of
   ICN on network security.

	 </t>
      </abstract>
   </front>
   <seriesInfo name="Internet-Draft" value="draft-pentikousis-icn-scenarios-04" />
   
</reference>
