A Survey of In-Network Storage Systems
RFC 6392
Internet Engineering Task Force (IETF) R. Alimi, Ed.
Request for Comments: 6392 Google
Category: Informational A. Rahman, Ed.
ISSN: 2070-1721 InterDigital Communications, LLC
Y. Yang, Ed.
Yale University
October 2011
A Survey of In-Network Storage Systems
Abstract
This document surveys deployed and experimental in-network storage
systems and describes their applicability for the DECADE (DECoupled
Application Data Enroute) architecture.
Status of This Memo
This document is not an Internet Standards Track specification; it is
published for informational purposes.
This document is a product of the Internet Engineering Task Force
(IETF). It represents the consensus of the IETF community. It has
received public review and has been approved for publication by the
Internet Engineering Steering Group (IESG). Not all documents
approved by the IESG are a candidate for any level of Internet
Standard; see Section 2 of RFC 5741.
Information about the current status of this document, any errata,
and how to provide feedback on it may be obtained at
http://www.rfc-editor.org/info/rfc6392.
Copyright Notice
Copyright (c) 2011 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License.
Alimi, et al. Informational [Page 1]
RFC 6392 DECADE Survey October 2011
Table of Contents
1. Introduction ....................................................3
2. Survey Overview .................................................3
2.1. Terminology and Concepts ...................................3
2.2. Historical Context .........................................3
3. In-Network Storage System Components ............................5
3.1. Data Access Interface ......................................5
3.2. Data Management Operations .................................5
3.3. Data Search Capability .....................................6
3.4. Access Control Authorization ...............................6
3.5. Resource Control Interface .................................6
3.6. Discovery Mechanism ........................................7
3.7. Storage Mode ...............................................7
4. In-Network Storage Systems ......................................7
4.1. Amazon S3 ..................................................7
4.2. BranchCache ................................................9
4.3. Cache-and-Forward Architecture ............................11
4.4. Cloud Data Management Interface ...........................12
4.5. Content Delivery Network ..................................14
4.6. Delay-Tolerant Network ....................................16
4.7. Named Data Networking .....................................18
4.8. Network of Information ....................................19
4.9. Network Traffic Redundancy Elimination ....................22
4.10. OceanStore ...............................................23
4.11. P2P Cache ................................................24
4.12. Photo Sharing ............................................26
4.13. Usenet ...................................................28
4.14. Web Cache ................................................29
4.15. Observations Regarding In-Network Storage Systems ........31
5. Storage and Other Related Protocols ............................32
5.1. HTTP ......................................................32
5.2. iSCSI .....................................................33
5.3. NFS .......................................................34
5.4. OAuth .....................................................36
5.5. WebDAV ....................................................37
5.6. Observations Regarding Storage and Related Protocols ......39
6. Conclusions ....................................................40
7. Security Considerations ........................................40
Show full document text