<?xml version='1.0' encoding='utf-8'?>
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" version="3" ipr="trust200902" docName="draft-oran-icnrg-reflexive-forwarding-06" category="exp" submissionType="IRTF" updates="8569, 8609" consensus="false" sortRefs="true" symRefs="true" tocDepth="4" prepTime="2023-09-26T10:25:26" indexInclude="true" scripts="Common,Latin" tocInclude="true">
  <front>
    <title abbrev="ICN Reflexive Forwarding">Reflexive Forwarding for CCNx and NDN Protocols</title>
    <seriesInfo name="Internet-Draft" value="draft-oran-icnrg-reflexive-forwarding-06" stream="IRTF"/>
    <!-- add "role="editor"" below for the editors if appropriate -->
    <author fullname="Dave Oran" initials="D." surname="Oran">
      <organization showOnFrontPage="true">Network Systems Research and Design</organization>
      <address>
        <postal>
          <street>4 Shady Hill Square</street>
          <!-- Reorder these if your country does things differently -->
          <city>Cambridge</city>
          <region>MA</region>
          <code>02138</code>
          <country>USA</country>
        </postal>
        <phone/>
        <email>daveoran@orandom.net</email>
        <!-- uri and facsimile elements may also be added -->
      </address>
    </author>
    <author fullname="Dirk Kutscher" initials="D." surname="Kutscher">
      <organization showOnFrontPage="true">HKUST(GZ)</organization>
      <address>
        <postal>
          <!--          <street>Nansha</street> -->
          <!-- Reorder these if your country does things differently -->
<!--          <code>26723</code> -->
          <city>Guangzhou</city>
          <country>China</country>
        </postal>
        <phone/>
        <email>ietf@dkutscher.net</email>
        <uri>https://dirk-kutscher.info</uri>
      </address>
    </author>
    <date day="26" month="09" year="2023"/>
    <!--    <date month="March" year="2020" /> -->

    <!-- Meta-data Declarations -->
    <workgroup>ICNRG</workgroup>
    <keyword>ICN</keyword>
    <keyword>Information-centric Networking</keyword>
    <keyword>forwarding</keyword>
    <abstract pn="section-abstract">
      <t indent="0" pn="section-abstract-1">
	Current Information-Centric Networking protocols such as CCNx
	and NDN have a wide range of useful applications in content
	retrieval and other scenarios that depend only on a robust
	two-way exchange in the form of a request and response
	(represented by an <em>Interest-Data exchange</em> in the case
	of the two protocols noted above). A number of important
	applications however, require placing large amounts of data in
	the Interest message, and/or more than one two-way
	handshake. While these can be accomplished using independent
	Interest-Data exchanges by reversing the roles of consumer and
	producer, such approaches can be both clumsy for applications
	and problematic from a state management, congestion control,
	or security standpoint. This specification proposes a
	<em>Reflexive Forwarding</em> extension to the CCNx and NDN
	protocol architectures that eliminates the problems inherent
	in using independent Interest-Data exchanges for such
	applications. It updates RFC8569 and RFC8609.
      </t>
    </abstract>
    <boilerplate>
      <section anchor="status-of-memo" numbered="false" removeInRFC="false" toc="exclude" pn="section-boilerplate.1">
        <name slugifiedName="name-status-of-this-memo">Status of This Memo</name>
        <t indent="0" pn="section-boilerplate.1-1">
        This Internet-Draft is submitted in full conformance with the
        provisions of BCP 78 and BCP 79.
        </t>
        <t indent="0" pn="section-boilerplate.1-2">
        Internet-Drafts are working documents of the Internet Engineering Task
        Force (IETF). Note that other groups may also distribute working
        documents as Internet-Drafts. The list of current Internet-Drafts is
        at <eref target="https://datatracker.ietf.org/drafts/current/" brackets="none"/>.
        </t>
        <t indent="0" pn="section-boilerplate.1-3">
        Internet-Drafts are draft documents valid for a maximum of six months
        and may be updated, replaced, or obsoleted by other documents at any
        time. It is inappropriate to use Internet-Drafts as reference
        material or to cite them other than as "work in progress."
        </t>
        <t indent="0" pn="section-boilerplate.1-4">
        This Internet-Draft will expire on 29 March 2024.
        </t>
      </section>
      <section anchor="copyright" numbered="false" removeInRFC="false" toc="exclude" pn="section-boilerplate.2">
        <name slugifiedName="name-copyright-notice">Copyright Notice</name>
        <t indent="0" pn="section-boilerplate.2-1">
            Copyright (c) 2023 IETF Trust and the persons identified as the
            document authors. All rights reserved.
        </t>
        <t indent="0" pn="section-boilerplate.2-2">
            This document is subject to BCP 78 and the IETF Trust's Legal
            Provisions Relating to IETF Documents
            (<eref target="https://trustee.ietf.org/license-info" brackets="none"/>) in effect on the date of
            publication of this document. Please review these documents
            carefully, as they describe your rights and restrictions with
            respect to this document.
        </t>
      </section>
    </boilerplate>
    <toc>
      <section anchor="toc" numbered="false" removeInRFC="false" toc="exclude" pn="section-toc.1">
        <name slugifiedName="name-table-of-contents">Table of Contents</name>
        <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1">
          <li pn="section-toc.1-1.1">
            <t indent="0" keepWithNext="true" pn="section-toc.1-1.1.1"><xref derivedContent="1" format="counter" sectionFormat="of" target="section-1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-introduction">Introduction</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.1.2">
              <li pn="section-toc.1-1.1.2.1">
                <t indent="0" keepWithNext="true" pn="section-toc.1-1.1.2.1.1"><xref derivedContent="1.1" format="counter" sectionFormat="of" target="section-1.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-problems-with-pushing-data">Problems with pushing data</xref></t>
              </li>
              <li pn="section-toc.1-1.1.2.2">
                <t indent="0" keepWithNext="true" pn="section-toc.1-1.1.2.2.1"><xref derivedContent="1.2" format="counter" sectionFormat="of" target="section-1.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-problems-with-utilizing-ind">Problems with utilizing independent exchanges</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.2">
            <t indent="0" pn="section-toc.1-1.2.1"><xref derivedContent="2" format="counter" sectionFormat="of" target="section-2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-requirements-language">Requirements Language</xref></t>
          </li>
          <li pn="section-toc.1-1.3">
            <t indent="0" pn="section-toc.1-1.3.1"><xref derivedContent="3" format="counter" sectionFormat="of" target="section-3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-overview-of-the-reflexive-f">Overview of the Reflexive Forwarding design</xref></t>
          </li>
          <li pn="section-toc.1-1.4">
            <t indent="0" pn="section-toc.1-1.4.1"><xref derivedContent="4" format="counter" sectionFormat="of" target="section-4"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-detailed-specification-of-r">Detailed Specification of Reflexive forwarding</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.4.2">
              <li pn="section-toc.1-1.4.2.1">
                <t indent="0" pn="section-toc.1-1.4.2.1.1"><xref derivedContent="4.1" format="counter" sectionFormat="of" target="section-4.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-terminology">Terminology</xref></t>
              </li>
              <li pn="section-toc.1-1.4.2.2">
                <t indent="0" pn="section-toc.1-1.4.2.2.1"><xref derivedContent="4.2" format="counter" sectionFormat="of" target="section-4.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-reflexive-forwarding-messag">Reflexive Forwarding message flow</xref></t>
              </li>
              <li pn="section-toc.1-1.4.2.3">
                <t indent="0" pn="section-toc.1-1.4.2.3.1"><xref derivedContent="4.3" format="counter" sectionFormat="of" target="section-4.3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-consumer-operation">Consumer
      Operation</xref></t>
              </li>
              <li pn="section-toc.1-1.4.2.4">
                <t indent="0" pn="section-toc.1-1.4.2.4.1"><xref derivedContent="4.4" format="counter" sectionFormat="of" target="section-4.4"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-naming-of-reflexive-interes">Naming of Reflexive Interests</xref></t>
              </li>
              <li pn="section-toc.1-1.4.2.5">
                <t indent="0" pn="section-toc.1-1.4.2.5.1"><xref derivedContent="4.5" format="counter" sectionFormat="of" target="section-4.5"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-producer-operation">Producer Operation</xref></t>
              </li>
              <li pn="section-toc.1-1.4.2.6">
                <t indent="0" pn="section-toc.1-1.4.2.6.1"><xref derivedContent="4.6" format="counter" sectionFormat="of" target="section-4.6"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-forwarder-operation">Forwarder Operation</xref></t>
                <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.4.2.6.2">
                  <li pn="section-toc.1-1.4.2.6.2.1">
                    <t indent="0" pn="section-toc.1-1.4.2.6.2.1.1"><xref derivedContent="4.6.1" format="counter" sectionFormat="of" target="section-4.6.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-forwarder-algorithms-in-pse">Forwarder algorithms in pseudocode</xref></t>
                    <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.4.2.6.2.1.2">
                      <li pn="section-toc.1-1.4.2.6.2.1.2.1">
                        <t indent="0" pn="section-toc.1-1.4.2.6.2.1.2.1.1"><xref derivedContent="4.6.1.1" format="counter" sectionFormat="of" target="section-4.6.1.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-processing-of-a-normal-inte">Processing of a normal Interest containing a Reflexive Name Prefix TLV</xref></t>
                      </li>
                      <li pn="section-toc.1-1.4.2.6.2.1.2.2">
                        <t indent="0" pn="section-toc.1-1.4.2.6.2.1.2.2.1"><xref derivedContent="4.6.1.2" format="counter" sectionFormat="of" target="section-4.6.1.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-processing-of-a-reflexive-i">Processing of a Reflexive Interest</xref></t>
                      </li>
                    </ul>
                  </li>
                </ul>
              </li>
              <li pn="section-toc.1-1.4.2.7">
                <t indent="0" pn="section-toc.1-1.4.2.7.1"><xref derivedContent="4.7" format="counter" sectionFormat="of" target="section-4.7"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-state-coupling-between-prod">State coupling between producer and consumer</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.5">
            <t indent="0" pn="section-toc.1-1.5.1"><xref derivedContent="5" format="counter" sectionFormat="of" target="section-5"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-use-cases-for-reflexive-int">Use cases for Reflexive Interests</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.5.2">
              <li pn="section-toc.1-1.5.2.1">
                <t indent="0" pn="section-toc.1-1.5.2.1.1"><xref derivedContent="5.1" format="counter" sectionFormat="of" target="section-5.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-achieving-remote-method-inv">Achieving Remote Method Invocation with Reflexive Interests</xref></t>
              </li>
              <li pn="section-toc.1-1.5.2.2">
                <t indent="0" pn="section-toc.1-1.5.2.2.1"><xref derivedContent="5.2" format="counter" sectionFormat="of" target="section-5.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-restful-web-interactions">RESTful Web Interactions</xref></t>
              </li>
              <li pn="section-toc.1-1.5.2.3">
                <t indent="0" pn="section-toc.1-1.5.2.3.1"><xref derivedContent="5.3" format="counter" sectionFormat="of" target="section-5.3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-achieving-simple-data-pull-">Achieving simple data pull from consumers with reflexive Interests</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.6">
            <t indent="0" pn="section-toc.1-1.6.1"><xref derivedContent="6" format="counter" sectionFormat="of" target="section-6"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-implementation-consideratio">Implementation Considerations</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.6.2">
              <li pn="section-toc.1-1.6.2.1">
                <t indent="0" pn="section-toc.1-1.6.2.1.1"><xref derivedContent="6.1" format="counter" sectionFormat="of" target="section-6.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-forwarder-implementation-co">Forwarder implementation considerations</xref></t>
                <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.6.2.1.2">
                  <li pn="section-toc.1-1.6.2.1.2.1">
                    <t indent="0" pn="section-toc.1-1.6.2.1.2.1.1"><xref derivedContent="6.1.1" format="counter" sectionFormat="of" target="section-6.1.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-interactions-with-input-pro">Interactions with Input Processing of Interest and Data packets</xref></t>
                  </li>
                  <li pn="section-toc.1-1.6.2.1.2.2">
                    <t indent="0" pn="section-toc.1-1.6.2.1.2.2.1"><xref derivedContent="6.1.2" format="counter" sectionFormat="of" target="section-6.1.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-interactions-with-interest-">Interactions with Interest Lifetime</xref></t>
                  </li>
                  <li pn="section-toc.1-1.6.2.1.2.3">
                    <t indent="0" pn="section-toc.1-1.6.2.1.2.3.1"><xref derivedContent="6.1.3" format="counter" sectionFormat="of" target="section-6.1.3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-interactions-with-interest-a">Interactions with Interest aggregation and multi-path/multi-destination forwarding</xref></t>
                  </li>
                </ul>
              </li>
              <li pn="section-toc.1-1.6.2.2">
                <t indent="0" pn="section-toc.1-1.6.2.2.1"><xref derivedContent="6.2" format="counter" sectionFormat="of" target="section-6.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-consumer-implementation-con">Consumer Implementation Considerations</xref></t>
                <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.6.2.2.2">
                  <li pn="section-toc.1-1.6.2.2.2.1">
                    <t indent="0" pn="section-toc.1-1.6.2.2.2.1.1"><xref derivedContent="6.2.1" format="counter" sectionFormat="of" target="section-6.2.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-data-objects-returned-by-th">Data objects returned by the consumer to reflexive name Interests arriving from a producer</xref></t>
                  </li>
                  <li pn="section-toc.1-1.6.2.2.2.2">
                    <t indent="0" pn="section-toc.1-1.6.2.2.2.2.1"><xref derivedContent="6.2.2" format="counter" sectionFormat="of" target="section-6.2.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-terminating-unwanted-reflex">Terminating unwanted reflexive Interest exchanges</xref></t>
                  </li>
                  <li pn="section-toc.1-1.6.2.2.2.3">
                    <t indent="0" pn="section-toc.1-1.6.2.2.2.3.1"><xref derivedContent="6.2.3" format="counter" sectionFormat="of" target="section-6.2.3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-interactions-with-caching">Interactions with caching</xref></t>
                  </li>
                </ul>
              </li>
              <li pn="section-toc.1-1.6.2.3">
                <t indent="0" pn="section-toc.1-1.6.2.3.1"><xref derivedContent="6.3" format="counter" sectionFormat="of" target="section-6.3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-producer-implementation-con">Producer Implementation Considerations</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.7">
            <t indent="0" pn="section-toc.1-1.7.1"><xref derivedContent="7" format="counter" sectionFormat="of" target="section-7"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-operational-considerations">Operational Considerations</xref></t>
          </li>
          <li pn="section-toc.1-1.8">
            <t indent="0" pn="section-toc.1-1.8.1"><xref derivedContent="8" format="counter" sectionFormat="of" target="section-8"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-mapping-to-ccnx-and-ndn-pac">Mapping to CCNx and NDN packet encodings</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.8.2">
              <li pn="section-toc.1-1.8.2.1">
                <t indent="0" pn="section-toc.1-1.8.2.1.1"><xref derivedContent="8.1" format="counter" sectionFormat="of" target="section-8.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-packet-encoding-for-ccnx">Packet encoding for CCNx</xref></t>
              </li>
              <li pn="section-toc.1-1.8.2.2">
                <t indent="0" pn="section-toc.1-1.8.2.2.1"><xref derivedContent="8.2" format="counter" sectionFormat="of" target="section-8.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-packet-encoding-for-ndn">Packet encoding for NDN</xref></t>
                <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.8.2.2.2">
                  <li pn="section-toc.1-1.8.2.2.2.1">
                    <t indent="0" pn="section-toc.1-1.8.2.2.2.1.1"><xref derivedContent="8.2.1" format="counter" sectionFormat="of" target="section-8.2.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-reflexive-name-component-ty">Reflexive Name Component Type</xref></t>
                  </li>
                  <li pn="section-toc.1-1.8.2.2.2.2">
                    <t indent="0" pn="section-toc.1-1.8.2.2.2.2.1"><xref derivedContent="8.2.2" format="counter" sectionFormat="of" target="section-8.2.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-reflexive-name-prefix-tlv">Reflexive Name Prefix TLV</xref></t>
                  </li>
                  <li pn="section-toc.1-1.8.2.2.2.3">
                    <t indent="0" pn="section-toc.1-1.8.2.2.2.3.1"><xref derivedContent="8.2.3" format="counter" sectionFormat="of" target="section-8.2.3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-pit-tokens-for-ndnlpv2">PIT Tokens for NDNLPv2</xref></t>
                  </li>
                </ul>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.9">
            <t indent="0" pn="section-toc.1-1.9.1"><xref derivedContent="9" format="counter" sectionFormat="of" target="section-9"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-iana-considerations">IANA Considerations</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.9.2">
              <li pn="section-toc.1-1.9.2.1">
                <t indent="0" pn="section-toc.1-1.9.2.1.1"><xref derivedContent="9.1" format="counter" sectionFormat="of" target="section-9.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-reflexive-name-prefix-tlv-2">Reflexive Name Prefix TLV</xref></t>
              </li>
              <li pn="section-toc.1-1.9.2.2">
                <t indent="0" pn="section-toc.1-1.9.2.2.1"><xref derivedContent="9.2" format="counter" sectionFormat="of" target="section-9.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-forward-and-reverse-pit-tok">Forward and Reverse PIT-Token hop-by-hop option TLVs</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.10">
            <t indent="0" pn="section-toc.1-1.10.1"><xref derivedContent="10" format="counter" sectionFormat="of" target="section-10"/>. <xref derivedContent="" format="title" sectionFormat="of" target="name-security-considerations">Security Considerations</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.10.2">
              <li pn="section-toc.1-1.10.2.1">
                <t indent="0" pn="section-toc.1-1.10.2.1.1"><xref derivedContent="10.1" format="counter" sectionFormat="of" target="section-10.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-collisions-of-reflexive-int">Collisions of reflexive Interest names</xref></t>
              </li>
              <li pn="section-toc.1-1.10.2.2">
                <t indent="0" pn="section-toc.1-1.10.2.2.1"><xref derivedContent="10.2" format="counter" sectionFormat="of" target="section-10.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-additional-resource-pressur">Additional resource pressure on PIT and FIB</xref></t>
              </li>
              <li pn="section-toc.1-1.10.2.3">
                <t indent="0" pn="section-toc.1-1.10.2.3.1"><xref derivedContent="10.3" format="counter" sectionFormat="of" target="section-10.3"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-potential-vulnerabilities-f">Potential Vulnerabilities from the use of PIT Tokens</xref></t>
              </li>
              <li pn="section-toc.1-1.10.2.4">
                <t indent="0" pn="section-toc.1-1.10.2.4.1"><xref derivedContent="10.4" format="counter" sectionFormat="of" target="section-10.4"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-privacy-considerations">Privacy Considerations</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.11">
            <t indent="0" pn="section-toc.1-1.11.1"><xref derivedContent="11" format="counter" sectionFormat="of" target="section-11"/>. <xref derivedContent="" format="title" sectionFormat="of" target="name-normative-references">Normative References</xref></t>
          </li>
          <li pn="section-toc.1-1.12">
            <t indent="0" pn="section-toc.1-1.12.1"><xref derivedContent="12" format="counter" sectionFormat="of" target="section-12"/>. <xref derivedContent="" format="title" sectionFormat="of" target="name-informative-references">Informative References</xref></t>
          </li>
          <li pn="section-toc.1-1.13">
            <t indent="0" pn="section-toc.1-1.13.1"><xref derivedContent="Appendix A" format="default" sectionFormat="of" target="section-appendix.a"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-alternative-designs-conside">Alternative Designs Considered</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.13.2">
              <li pn="section-toc.1-1.13.2.1">
                <t indent="0" pn="section-toc.1-1.13.2.1.1"><xref derivedContent="A.1" format="counter" sectionFormat="of" target="section-appendix.a.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-handling-reflexive-interest">Handling reflexive interests using dynamic FIB entries</xref></t>
                <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.13.2.1.2">
                  <li pn="section-toc.1-1.13.2.1.2.1">
                    <t indent="0" pn="section-toc.1-1.13.2.1.2.1.1"><xref derivedContent="A.1.1" format="counter" sectionFormat="of" target="section-appendix.a.1.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-design-complexities-and-per">Design complexities and performance issues with FIB-based design</xref></t>
                  </li>
                  <li pn="section-toc.1-1.13.2.1.2.2">
                    <t indent="0" pn="section-toc.1-1.13.2.1.2.2.1"><xref derivedContent="A.1.2" format="counter" sectionFormat="of" target="section-appendix.a.1.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-interactions-between-fib-ba">Interactions between FIB-based design and Interest Lifetime</xref></t>
                  </li>
                </ul>
              </li>
              <li pn="section-toc.1-1.13.2.2">
                <t indent="0" pn="section-toc.1-1.13.2.2.1"><xref derivedContent="A.2" format="counter" sectionFormat="of" target="section-appendix.a.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-reflexive-forwarding-using-">Reflexive forwarding using Path Steering</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.14">
            <t indent="0" pn="section-toc.1-1.14.1"><xref derivedContent="Appendix B" format="default" sectionFormat="of" target="section-appendix.b"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-implementations">Implementations</xref></t>
            <ul bare="true" empty="true" indent="2" spacing="compact" pn="section-toc.1-1.14.2">
              <li pn="section-toc.1-1.14.2.1">
                <t indent="0" pn="section-toc.1-1.14.2.1.1"><xref derivedContent="B.1" format="counter" sectionFormat="of" target="section-appendix.b.1"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-reflexive-name-segment">Reflexive Name Segment</xref></t>
              </li>
              <li pn="section-toc.1-1.14.2.2">
                <t indent="0" pn="section-toc.1-1.14.2.2.1"><xref derivedContent="B.2" format="counter" sectionFormat="of" target="section-appendix.b.2"/>.  <xref derivedContent="" format="title" sectionFormat="of" target="name-processing-reflexive-intere">Processing Reflexive Interests&gt;</xref></t>
              </li>
            </ul>
          </li>
          <li pn="section-toc.1-1.15">
            <t indent="0" pn="section-toc.1-1.15.1"><xref derivedContent="" format="none" sectionFormat="of" target="section-appendix.c"/><xref derivedContent="" format="title" sectionFormat="of" target="name-authors-addresses">Authors' Addresses</xref></t>
          </li>
        </ul>
      </section>
    </toc>
  </front>
  <middle>
    <section anchor="intro" numbered="true" removeInRFC="false" toc="include" pn="section-1">
      <name slugifiedName="name-introduction">Introduction</name>
      <t indent="0" pn="section-1-1">
    Current ICN protocols such as <xref target="RFC8569" format="default" sectionFormat="of" derivedContent="RFC8569">CCNx</xref>
    and <xref target="NDN" format="default" sectionFormat="of" derivedContent="NDN">NDN</xref> have a wide range of useful
    applications in content retrieval and other scenarios that depend
    only on a robust two-way exchange in the form of a request and
    response. These ICN architectures use the terms "consumer" and
    "producer" for the respective roles of the requester and the
    responder, and the protocols directly capture the mechanics of the
    two-way exchange through the "Interest message" carrying the
    request, and the "Data message" carrying the response. Through
    these constructs, the protocols are heavily biased toward a pure
    <em>pull-based</em> interaction model where requests are small
    (carrying little or no user-supplied data other than the name of
    the requested data object), and responses are relatively large -
    up to an architecture-defined maximum transmission unit (MTU) on
    the order of kilobytes or tens of kilobytes.
      </t>
      <t indent="0" pn="section-1-2">
    A number of important applications however require interaction
    models more complex than individual request/response interactions
    in the same direction (i.e. between the same consumer and one or
    more producers). Among these we identify three important classes
    which are the target of the proposed enhancements defined in this
    specification. These are described in the following paragraphs.
      </t>
      <dl indent="3" newline="false" spacing="normal" pn="section-1-3">
        <dt pn="section-1-3.1"><strong>Remote Method Invocation (RMI, aka RPC):</strong></dt>
        <dd pn="section-1-3.2">
      When invoking a remote method, it is common for the method to
      require arguments supplied by the caller. In conventional TCP/IP
      style protocols like CORBA or HTTP "Post", these are pushed to
      the server as part of the message or messages that comprise the
      request. In ICN-style protocols there is an unattractive choice
      between inflating the request initiation with pushed arguments,
      or arranging to have one or more independent request/response pairs
      in the opposite direction for the server to fetch the
      arguments. Both of these approaches have substantial
      disadvantages. Recently, a viable alternative emerged through
      the work on <xref target="Krol2018" format="default" sectionFormat="of" derivedContent="Krol2018">RICE</xref> which pioneered
      the main design elements proposed in this specification.
    </dd>
        <dt pn="section-1-3.3"><strong>Phone-Home scenario:</strong></dt>
        <dd pn="section-1-3.4">
      Applications in sensing, Internet-of-things (IoT) and other
      types where data is produced unpredictably and needs to be
      <em>pushed</em> somewhere create a conundrum for the pure
      pull-based architectures considered here. If instead one eschews
      relaxing the size asymmetry between requests and responses, some
      additional protocol machinery is needed. Earlier efforts in the
      ICN community have recognized this issue and designed methods to
      provoke a cooperating element to issue a request to return the
      data the originator desires to push, essentially "phoning home"
      to get the responder to fetch the data. One that has been
      explored to some extent is the <em>Interest-Interest-Data</em>
      exchange <xref target="Carzaniga2011" format="default" sectionFormat="of" derivedContent="Carzaniga2011"/>, where an Interest is
      sent containing the desired request as encapsulated
      data. CCNx-1.0 Bidirectional Streams <xref target="Mosko2017" format="default" sectionFormat="of" derivedContent="Mosko2017"/>
      are also based on a scheme where an Interest is used to signal a
      name prefix that a consumer has registered for receiving
      Interests from a peer in a bidirectional streaming session.
      <!--
      <cref source="DO">I tried to find a
      reference for Interest-Interest-Data without success - any
      ideas?</cref> <cref
      source="DKU">https://ieeexplore.ieee.org/document/7119766
      probably - cannot access right now though</cref> -->
    </dd>
        <dt pn="section-1-3.5"><strong>Peer state synchronization:</strong></dt>
        <dd pn="section-1-3.6">
      A large class of applications, typified by those built on top of
      reliable order-preserving transport protocols, require
      initial state synchronization between the peers. This is
      accomplished with a three-way (or longer) handshake, since
      employing a two-way handshake as provided in the existing NDN
      and CCNx protocols exposes a number of well-know hazards, such
      as <em>half-open connections</em>. When attempted for
      security-related operations such as key exchange, additional
      hazards such as <em>man-in-the-middle</em> attacks become
      trivial to mount. Existing alternatives, similar to those used
      in the two examples above, instead utilize either overlapping
      Interest-Data exchanges in opposite directions (resulting in a
      four-way handshake) or by adding initialization data to the
      initial request and employing an Interest-Interest-Data protocol
      extension as noted in the Phone-home scenarios above.
    </dd>
      </dl>
      <t indent="0" pn="section-1-4">
    All of the above application interaction models present
    interesting challenges, as neither relaxing the architecture to
    support pushing large amounts of data, nor introducing substantial
    complexities through multiple independent Interest-Data exchanges
    is an attractive approach. The following subsections provide
    further background and justification for why push and/or
    independent exchanges are problematical.
      </t>
      <section anchor="push-problems" numbered="true" removeInRFC="false" toc="include" pn="section-1.1">
        <name slugifiedName="name-problems-with-pushing-data">Problems with pushing data</name>
        <t indent="0" pn="section-1.1-1">
    There are two substantial problems with the simple approach of
    just allowing arbitrary amounts of data to be included with
    requests. These are:
        </t>
        <ol indent="adaptive" spacing="normal" start="1" type="1" pn="section-1.1-2">
     <li pn="section-1.1-2.1" derivedCounter="1.">
       In ICN protocols such as NDN and CCNx, Interest messages are intended to be small,
       on the order the size of a TCP ACK, as opposed to the size of a
       TCP data segment. This is because the hop-by-hop congestion
       control and forwarder state management requires Interest
       messages to be buffered in expectation of returning data, and
       possibly retransmitted hop-by-hop as opposed to end-to-end. In
       addition, the need to create and manage state on a per-Interest
       basis is substantially complicated if requests in Interest
       messages are larger than a Path MTU (PMTU) and need to be
       fragmented hop-by-hop.
     </li>
          <li pn="section-1.1-2.2" derivedCounter="2.">
       If the payload data of a request is used for invoking a
       computation (as in the RMI case described above)
       then substantial bandwidth can be wasted if the computation is
       either refused or abandoned for any number of reasons,
       including the requestor failing an authorization check, or the
       responder not having sufficient resources to execute the
       associated computation.
     </li>
        </ol>
        <t indent="0" pn="section-1.1-3">
     These problems also exist in pure datagram transport protocols
     such as those used for legacy RMI applications like <xref target="RFC7530" format="default" sectionFormat="of" derivedContent="RFC7530">NFS</xref>. More usual are application protocols
     like HTTP(s) which rely on the TCP or QUIC 3-way handshake to
     establish a session and then have congestion control and
     segmentation provided as part of the transport protocol, further
     allowing sessions to be rejected before large amounts of data are
     transmitted or significant computational resources expended.
        </t>
      </section>
      <section anchor="independent-exchange-problems" numbered="true" removeInRFC="false" toc="include" pn="section-1.2">
        <name slugifiedName="name-problems-with-utilizing-ind">Problems with utilizing independent exchanges</name>
        <t indent="0" pn="section-1.2-1">
    In order to either complete a three-way handshake, or fetch data
    via a pull from the original requestor, the role of consumer and
    producer need to be reversed and an Interest/Data exchange
    initiated in the direction opposite of the initiating
    exchange. When done with an independent Interest/Data request and
    response, a number of complications ensue. Among them are:
        </t>
        <ol indent="adaptive" spacing="normal" start="1" type="1" pn="section-1.2-2">
    <li anchor="routable-name-prefix" pn="section-1.2-2.1" derivedCounter="1.">
      The originating consumer needs to have a routable name prefix
      that can be used for the exchange. This means the consumer must
      arrange to have its name prefix propagated in the ICN routing system
      with sufficient reach that the producer issuing the interest can
      be assured it is routed appropriately. While some consumers are
      generally online and act as application servers, justifying the
      maintenance of this routing information, many do not. Further,
      in mobile environments, a pure consumer that does not need to
      have a routable name prefix can benefit from the inherent
      consumer mobility support in the CCNx and NDN protocols. By
      requiring a routable name prefix, extra mobile routing machinery
      is needed, such as that proposed in <xref target="Zhang2018" format="default" sectionFormat="of" derivedContent="Zhang2018">KITE</xref> or <xref target="Auge2018" format="default" sectionFormat="of" derivedContent="Auge2018">MAPME</xref>.
<!--
      <em>Note: I could not get the
      mapme internet draft reference to resolve, so I am using the
      IEEE paper instead for now.</em>
-->
    </li>
          <li anchor="reflection-attack" pn="section-1.2-2.2" derivedCounter="2.">
      The consumer name prefix in <xref target="routable-name-prefix" format="counter" sectionFormat="of" derivedContent="1">item</xref> above must be communicated to the
      producer as a payload, name suffix, or other field of the
      initiating Interest message. Since this name in its entirety is
      chosen by the consumer, it is highly problematic from a security
      standpoint, as it can recruit the producer to mount a reflection
      attack against the consumer's chosen victim.<!-- ' -->
    </li>
          <li pn="section-1.2-2.3" derivedCounter="3.">
      The correlation between the exchanges in opposite directions
      must be maintained by both the consumer and the producer as
      independent state, as opposed to being architecturally tied
      together as would be the case with a conventional 3-way
      handshake finite state machine. While this can of course be
      accomplished with care by both parties, experience has shown
      that it is error prone (for example see the checkered history of
      interactions between the <xref target="RFC3261" format="default" sectionFormat="of" derivedContent="RFC3261">SIP</xref> and
      <xref target="RFC6337" format="default" sectionFormat="of" derivedContent="RFC6337">SDP Offer-Answer</xref>) protocols. When employed
      as the wrapper for a key management protocol such as with <xref target="RFC8446" format="default" sectionFormat="of" derivedContent="RFC8446">TLS</xref> state management errors can be
      catastrophic for security.
    </li>
        </ol>
      </section>
    </section>
    <section numbered="true" removeInRFC="false" toc="include" pn="section-2">
      <name slugifiedName="name-requirements-language">Requirements Language</name>
      <t indent="0" pn="section-2-1">The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
        "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
        document are to be interpreted as described in BCP 14
       <xref target="RFC2119" format="default" sectionFormat="of" derivedContent="RFC2119"/> <xref target="RFC8174" format="default" sectionFormat="of" derivedContent="RFC8174"/> when, and only
       when, they appear in all capitals, as shown here.</t>
    </section>
    <section anchor="design-overview" numbered="true" removeInRFC="false" toc="include" pn="section-3">
      <name slugifiedName="name-overview-of-the-reflexive-f">Overview of the Reflexive Forwarding design</name>
      <t indent="0" pn="section-3-1">
  This specification defines a <em>Reflexive Forwarding</em> extension
  to CCNx and NDN that avoids the problems enumerated in Sections
  <xref target="push-problems" format="counter" sectionFormat="of" derivedContent="1.1"/> and <xref target="independent-exchange-problems" format="counter" sectionFormat="of" derivedContent="1.2"/>. It
  straightforwardly exploits the hop-by-hop state and symmetric
  routing properties of the current protocols.
</t>
      <t indent="0" pn="section-3-2">
  <xref target="forwarder-data-structures" format="default" sectionFormat="of" derivedContent="Figure 1"/> below illustrates a
  canonical NDN/CCNx forwarder with its conceptual data structures of
  the Content Store (CS), Pending Interest Table (PIT) and Forwarding
  Information Base (FIB). The key observation involves the relation
  between the PIT and the FIB. Upon arrival of an Interest, a PIT
  entry is created which contains state recording the incoming
  interface on which the Interest was received on. If the Interest is
  not immediately satisfied by cached data in the CS, the forwarder
  looks up the name in the FIB to ascertain the <em>next-hop</em> to
  propagate the Interest onward upstream toward the named
  producer. Therefore, a chain of forwarding state is established
  during Interest forwarding that couples the PIT entries of the chain
  of forwarders together conceptually as <em>breadcrumbs</em>. These
  are used to forward the returning Data Message over the inverse path
  through the chain of forwarders until the Data message arrives at
  the originating consumer. The state in the PITs is <em>unwound</em>
  by destroying it as each PIT entry is <em>satisfied</em>. This
  behavior is <strong>critical</strong> to the feasibility of the
  reflexive forwarding design we propose.
</t>
      <figure anchor="forwarder-data-structures" align="left" suppress-title="false" pn="figure-1">
        <name slugifiedName="name-icn-forwarder-structure">ICN forwarder structure</name>
        <!-- <artwork type="svg" src="data-fwd-new-svgt.svg"/> -->
		<!-- <artwork type="svg" src="interest_fwr-svgt.svg"></artwork> -->
		<!-- <artwork type="svg" src="data_fwr-svgt.svg"></artwork> -->

		<artwork type="ascii-art" align="left" pn="section-3-3.1">
 +-----------------------------------------------------------------+
 |                                                      ICN Node   |
 | Send data to all                                     ========   |
 | interfaces that                                                 |
 | requested it                                                    |
 |                  YES +------------------+                       |
&lt;------------------------| Pending Interest |  &lt;---------------------
 |              |       |    Table (PIT)   |               Data    |
 |              |       +------------------+  1) Find     (Signed) |
 |              | 2) Save         |              Name              |
 |              V    Data         | NO            in               |
 |   +---------------+            |              PIT?              |
 |   | Content Store |            |                                |
 |   |      (CS)     |            |                                |
 |   +---------------+            |                                |
 |                                |                                |
 |                                V                                |
 |                             Drop Data                           |
 |                                                                 |
 +-----------------------------------------------------------------+
</artwork>
        <artwork type="ascii-art" align="left" pn="section-3-3.2">
 +-----------------------------------------------------------------+
 |                                                      ICN Node   |
 |                                                      ========   |
 |                                                                 |
 |                                           +====================+|
 |                                           |Forwarding Strategy ||
 |                                           +====================+|
 |                                                                 |
 |   1) Find name          2) Matching        3) Find matching     |
 |        in CS?              name in PIT?       entry in FIB?     |
 |                    NO                   NO                   YES|
 |  +---------------+   +----------------+   +-------------------+ |
 |  | Content Store |   |   Pending      |   |  Forwarding       | |
---&gt;|      (CS)     |--&gt;|   Interest     |--&gt;|  Information Base |--&gt;
 |  |               |   |   Table (PIT)  |   |     ( FIB)        | |
 |  +---------------+   +----------------+   +-------------------+ |
 | Return   | YES           YES | NO               NO |            |
 |  Data    |          Add      |   Add               |  Drop      |
 |          |          Incoming |   new               |   or       |
 |   &lt;------|          Itf.     |   Interest          |  NACK      |
 |                              V                     V            |
 |                                                                 |
 +-----------------------------------------------------------------+
</artwork>
      </figure>
      <t indent="0" pn="section-3-4">
	  Given the above forwarding properties for Interests, it
	  should be clear that while an Interest is outstanding and
	  ultimately arrives at a producer who can respond to it,
	  there is sufficient state in the chain of forwarders to
	  route not just a returning Data message, but potentially
	  another Interest directed through the inverse path to the
	  unique consumer who issued the original Interest. (<xref target="interest-aggregation" format="default" sectionFormat="of" derivedContent="Section 6.1.3"/> describes how Interest
	  aggregation of requests to the same target name from multiple consumers
	  interacts with this scheme.) The key question
	  therefore is how to access this state in a way that it can
	  be used to forward Interests.
      </t>
      <t indent="0" pn="section-3-5">
	  In order to achieve this <em>Reflexive Interest</em>
	  forwarding on the inverse path recorded in the PIT of each
	  forwarder, we need a few critical design elements: 
      </t>
      <ol indent="adaptive" spacing="normal" start="1" type="1" pn="section-3-6">
	  <li pn="section-3-6.1" derivedCounter="1.">
	    The Reflexive Interest needs to have a <em>Name</em>. This name is
	    what the originating consumer will use to match against
	    the Data object (or multiple Data objects — more on this
	    later) that the producer may request by issuing the
	    Reflexive Interest. This cannot be just any name, but
	    needs to essentially name the state already recorded in
	    the PIT and not allow the consumer to manufacture an
	    arbitrary name and mount a reflection attack as pointed
	    out in <xref target="reflection-attack" format="default" sectionFormat="of" derivedContent="Section 1.2, Paragraph 2, Item 2"/>.
	  </li>
        <li anchor="interest-fwd-requirements" pn="section-3-6.2" derivedCounter="2.">
	    Each forwarder along the inverse path from producer to
	    consumer must be able to forward the reflexive Interest
	    towards the direction of the Consumer, without relying
	    on global routing information, as the Reflexive
	    Name Prefixes are only valid while the originating Interest/Data exchange
	    state is present at the forwarders. Essential to this operation is the ability to
	    access the PIT entry associated with the original Interest
	    message, since that contains the state necessary to
	    identify the ingress face of the original Interest, which
	    is the unique (modulo aggregation) output face over which the Reflexive
	    Interest needs to be forwarded. The Name assigned by the
	    consumer for Reflexive Name Prefix in theory is adequate
	    to the task, but entails an expensive and complicated
	    lookup procedure. In order to make this lookup both simple
	    and efficient, we adopt an extended version of the
	    "PIT-Token" scheme pioneered by the high-speed <xref target="Shi2020" format="default" sectionFormat="of" derivedContent="Shi2020">NIST NDN forwarder</xref>. In this
	    specification, we are using <em>Forward Direction PIT
	    Tokens</em> (FPTs) that nodes attach to forwarded
	    Interests in the upstream direction, and <em>Reverse
	    Direction PIT Tokens</em> (RPTs) that nodes attach to
	    Reflexive Interests (as well as regular Data messages) in
	    the downstream direction. We describe the specific
	    processing requirements in more detail below.
	  </li>
        <li pn="section-3-6.3" derivedCounter="3.">
	    There has to be coupling of the state between the
	    originating Interest-Data exchange and the enclosed
	    Reflexive Interest-Data exchange at both the consumer and
	    the producer. In our design, this is accomplished by the
	    way reflexive interest names are chosen.
	  </li>
      </ol>
    </section>
    <section anchor="detailed-specification" numbered="true" removeInRFC="false" toc="include" pn="section-4">
      <name slugifiedName="name-detailed-specification-of-r">Detailed Specification of Reflexive forwarding</name>
      <t indent="0" pn="section-4-1">
	  The following sections provide the normative details on each
	  of these design elements.</t>
      <section anchor="terminology" numbered="true" removeInRFC="false" toc="include" pn="section-4.1">
        <name slugifiedName="name-terminology">Terminology</name>
        <t indent="0" pn="section-4.1-1">For general ICN-related terms, we adopt the terms defined in <xref target="RFC8793" format="default" sectionFormat="of" derivedContent="RFC8793"/>. For CCNx-specific terms, we use the terms defined in <xref target="RFC8609" format="default" sectionFormat="of" derivedContent="RFC8609"/>. This specification defines the following additional terms:</t>
        <dl indent="3" newline="false" spacing="normal" pn="section-4.1-2">
          <dt pn="section-4.1-2.1"><strong>Reflexive Interest</strong> (RI)</dt>
          <dd pn="section-4.1-2.2">An interest message sent from a producer back towards a consumer to fetch data needed to satisfy the original interest</dd>
          <dt pn="section-4.1-2.3"><strong>Reflexive Name Segment</strong></dt>
          <dd pn="section-4.1-2.4">A high-order typed name segment which identifies an Interest as being a Reflexive Interest instead of a normal Interest.</dd>
          <dt pn="section-4.1-2.5"><strong>Reflexive Name Prefix TLV</strong> (RNP)</dt>
          <dd pn="section-4.1-2.6">An Interest message TLV indicating to a producer that it may fetch data from the sending consumer by issuing one or more corresponding Relfexive Interests. It consists of a Name prefix whose high-order is a Reflexive Name Segment as defined above.</dd>
          <dt pn="section-4.1-2.7"><strong>PIT Token</strong></dt>
          <dd pn="section-4.1-2.8">A hop-by-hop option in either an Interest or data message allowing a forwarder to locate the PIT entry of the corresponding Interest/Data exchange without the overhead of a full exact name lookup</dd>
          <dt pn="section-4.1-2.9"><strong>Forward PIT Token</strong> (FPT)</dt>
          <dd pn="section-4.1-2.10">A PIT Token added when forwarding an Interest to refer to the PIT entry the forwarder has made for that Interest/Data exchange</dd>
          <dt pn="section-4.1-2.11"><strong>Reverse PIT Token</strong> (RPT)</dt>
          <dd pn="section-4.1-2.12">A PIT token (copied from the corresponding forward PIT token) added to either a Data message or a Reflexive Interest to allow a forwarder to locate the PIT entry of the corresponding interest/Data exchange without the over head of a full exact name lookup</dd>
        </dl>
      </section>
      <section anchor="message-flow" numbered="true" removeInRFC="false" toc="include" pn="section-4.2">
        <name slugifiedName="name-reflexive-forwarding-messag">Reflexive Forwarding message flow</name>
        <t indent="0" pn="section-4.2-1">The overall interaction flow for reflexive forwarding is illustrated below in <xref target="overall-message-flow" format="default" sectionFormat="of" derivedContent="Figure 2"/>.</t>
        <figure anchor="overall-message-flow" align="left" suppress-title="false" pn="figure-2">
          <name slugifiedName="name-message-flow-overview">Message Flow Overview</name>
          <artwork type="ascii-art" align="left" pn="section-4.2-2.1" originalSrc="message-flow-generic.txt">+-----------+              +-----------+                 +-----------+
| Consumer  |              | Forwarder |                 | Producer  |
+-----------+              +-----------+                 +-----------+
      |                          |                             |
      | I1                       |                             |
      |-------------------------&gt;|                             |
      |           -------------\ |                             |
      |           | Record RNP |-|                             |
      |           | in PIT(I1) | |                             |
      |           |------------| |                             |
      |                          | --------------------\       |
      |                          |-| Add FPT to I1.FPT |       |
      |                          | |-------------------|       |
      |                          |                             |
      |                          | I1                          |
      |                          |----------------------------&gt;|
      |                          |                             | ------------\
      |                          |                             |-| Check     |
      |                          |                             | | prefix,   |
      |                          |                             | | creating  |
      |                          |                             | | Reflexive |
      |                          |                             | | Interest  |
      |                          |                             | | state     |
      |                          |                             | |-----------|
      |                          |         ------------------\ |
      |                          |         | I1.FPT-&gt;RI1.RPT |-|
      |                          |         |-----------------| |
      |                          |                             |
      |                          |                         RI1 |
      |                          |&lt;----------------------------|
      |                          | ----------------------\     |
      |                          |-| use RI1.RPT to find |     |
      |                          | | PIT(I1),            |     |
      |                          | | check match         |     |
      |                          | | of PIT(I1).RNP      |     |
      |                          | | create PIT(RI1),    |     |
      |                          | | forward RI1         |     |
      |                          | |---------------------|     |
      |------------------------\ |                             |
      || add I1.RPT and I2.FPT |-|                             |
      || to PIT(I2)            | |                             |
      ||-----------------------| |                             |
      |                          |                             |
      |                      RI1 |                             |
      |&lt;-------------------------|                             |
      |                          |                             |
      | RD1 obj                  |                             |
      |-------------------------&gt;|                             |
      |------------------------\ |                             |
      || consume PIT(I2) entry |-|                             |
      || and forward RD1       | |                             |
      ||-----------------------| |                             |
      |     -------------------\ |                             |
      |     | RI1.FPT-&gt;RD1.RPT |-|                             |
      |     |------------------| |                             |
      |                          | -------------------\        |
      |                          |-| satisfy PIT(RI1) |        |
      |                          | |------------------|        |
      |                          |                             |
      |                          | RD1                         |
      |                          |----------------------------&gt;|
      |                          |                             | -------------\
      |                          |                             |-| all        |
      |                          |                             | | parameters |
      |                          |                             | | received,  |
      |                          |                             | | answer I1  |
      |                          |                             | |------------|
      |                          |                             |
      |                          |                   D1 object |
      |                          |&lt;----------------------------|
      |     -------------------\ |                             |
      |     | satisfy PIT(I1), |-|                             |
      |     | forward D1       | |                             |
      |     |------------------| |                             |
      |       -----------------\ |                             |
      |       | I1.FPT-&gt;D1.RPT |-|                             |
      |       |----------------| |                             |
      |                          |                             |
      |                       D1 |                             |
      |&lt;-------------------------|                             |
      |                          |                             |
</artwork>
          <artwork type="ascii-art" align="left" pn="section-4.2-2.2">
    Legend:
    I1: Interest #1 containing the Reflexive Name Prefix TLV
    RI1: Reflexive Interest with Reflexive Name Prefix Segment
    RNP: Reflexive Name Prefix
    FPT: Forward Direction PIT Token
    RPT: Reverse Direction PIT Token
    D1: Data message, answering initiating I1 Interest
    RD1: Data message, answering RI
</artwork>
        </figure>
      </section>
      <section anchor="consumer-operation" numbered="true" removeInRFC="false" toc="include" pn="section-4.3">
        <name slugifiedName="name-consumer-operation">Consumer
      Operation</name>
        <t indent="0" pn="section-4.3-1">
	A consumer that wants to employ Reflexive Forwarding
	 MUST create an Interest (I1) with a Reflexive Name
	Prefix (RNP) TLV that is used by the producer when
	issuing Reflexive Interests (RI) back to the consumer. Upon
	receiving a Reflexive Interest (e.g. RI1 in <xref target="overall-message-flow" format="default" sectionFormat="of" derivedContent="Figure 2"/>) from a Producer in response
	to the Interest whose first name segment is the RNP supplied
	earlier, the consumer SHOULD perform a name match against the
	object specified in the Reflexive Name, and return that
	object to the producer in a conventional Data message,
	(e.g. RD1 in <xref target="overall-message-flow" format="default" sectionFormat="of" derivedContent="Figure 2"/>).
        </t>
      </section>
      <section anchor="naming" numbered="true" removeInRFC="false" toc="include" pn="section-4.4">
        <name slugifiedName="name-naming-of-reflexive-interes">Naming of Reflexive Interests</name>
        <t indent="0" pn="section-4.4-1">
	A consumer may have one or more objects for the producer to
	fetch, and therefore needs to communicate enough information
	in its initial Interest to allow the producer to construct
	properly formed Reflexive Interest names. For some
	applications the set of <em>full names</em> (see <xref target="RFC8793" format="default" sectionFormat="of" derivedContent="RFC8793">the ICN Terminology RFC</xref>) is known a priori, for
	example through compile time bindings of arguments in
	an interface definition or by the architectural definition of a
	simple sensor reading. In other cases, the full names of the
	individual objects must be communicated via the RNP in the original
	Interest message.
        </t>
        <t indent="0" pn="section-4.4-2">
	We define a new typed name segment, identified by a
	registered name segment type in the IANA registry for <xref target="RFC8609" format="default" sectionFormat="of" derivedContent="RFC8609"/>. We call this the <em>Reflexive Interest
	Name Segment type</em>. It MUST be the first (i.e. high
	order) name segment of any Reflexive Interest issued by a
	producer. Its value is a random 128 bit quantity, assigned by
	the consumer, which provides the entropy required to uniquely
	identify the issuing consumer for the duration of any
	outstanding Interest-Data exchange. We suggest using a UUID as
	specified in <xref target="RFC4122" format="default" sectionFormat="of" derivedContent="RFC4122"/> but any scheme that
	meets the randomness and entropy requirements can suffice. The
	consumer SHOULD choose a different random value for each
	Interest message it constructs because:</t>
        <ol indent="adaptive" spacing="normal" start="1" type="1" pn="section-4.4-3">
	  <li pn="section-4.4-3.1" derivedCounter="1.">If there is insufficient randomness, a name collision on
	  the Reflexive Names could occur at any of the intermediate
	  forwarders which would result in the same mutability
	  problems generated by poor name selection in other contexts;
	  and</li>
          <li pn="section-4.4-3.2" derivedCounter="2.">Re-use of the same reflexive interest name over multiple
	  interactions might reveal linkability information that could
	  be used by surveillance adversaries for tracking
	  purposes.</li>
        </ol>
        <t indent="0" pn="section-4.4-4">
	  This initial name segment is either communicated by itself
	  through a <em>Reflexive Name Prefix TLV</em> in the
	  originating Interest, or prepended to any object names the
	  consumer wishes the producer to fetch explicitly where there
	  is more than one object needed by the producer for the
	  current Interest-Data interaction. There are four cases to
	  consider:
        </t>
        <ol indent="adaptive" spacing="normal" start="1" type="1" pn="section-4.4-5">
	  <li anchor="single-reflexive-object" pn="section-4.4-5.1" derivedCounter="1.">
	    The reflexive <em>fullname</em> of a single object to
	    fetch.
	  </li>
          <li pn="section-4.4-5.2" derivedCounter="2.">
	    A single reflexive name prefix out of which the producer
	    can (by application-specific means) construct a number of
	    <em>fullnames</em> of the objects it may want to fetch.
	  </li>
          <li pn="section-4.4-5.3" derivedCounter="3.">
	    The reflexive <em>fullname</em> of a <xref target="I-D.irtf-icnrg-flic" format="default" sectionFormat="of" derivedContent="I-D.irtf-icnrg-flic">FLIC Manifest</xref>
	    enumerating the suffixes that may be used by the producer
	    to construct the necessary names. We distinguish this from the single object fetch
	    in <xref target="single-reflexive-object" format="counter" sectionFormat="of" derivedContent="1">case</xref> above because 
	    the use of a Manifest implies multiple reflexive Interest/Data exchanges with the consumer. 
	  </li>
          <li pn="section-4.4-5.4" derivedCounter="4.">
	    Multiple Reflexive Name Prefix TLVs MAY be included in the
	    Interest message if none of the above 3 options covers the
	    desired use case.
	  </li>
        </ol>
        <t indent="0" pn="section-4.4-6">
	  The last of the four options above, while not explicitly
	  outlawed, SHOULD NOT be used. This is because it results in
	  a longer Interest message and requires extra PIT
	  resources. Hence, it is more likely a forwarder will reject
	  the Interest for lack of resources. A forwarder MAY optimize
	  for the case of a single Reflexive Name TLV at the expense
	  of those with more than one.
        </t>
        <t indent="0" pn="section-4.4-7">
	  A producer, upon receiving an Interest with one or more
	  Reflexive Name Prefix TLVs, may decide it needs to retrieve the
	  associated data object(s). It therefore can issue one or
	  more Reflexive Interests by appending the necessary name
	  segments needed to form valid full names of the associated
	  objects present at the originating consumer. These in fact
	  comprise conventional Interest-Data exchanges, with no
	  alteration of the usual semantics with regard to signatures,
	  caching, expiration, etc. When the producer has retrieved
	  the required objects to complete the original Interest-Data
	  exchange, it can issue its Data response, which unwinds all
	  the established state at the producer, the consumer, and the
	  intermediate forwarders.
        </t>
      </section>
      <section anchor="producer-operation" numbered="true" removeInRFC="false" toc="include" pn="section-4.5">
        <name slugifiedName="name-producer-operation">Producer Operation</name>
        <t indent="0" pn="section-4.5-1">
	A producer that has received an Interest with a Reflexive Name
	Prefix (RNP) MUST store the supplied RNP and the Forward PIT
	Token (FPT) from the received Interest for subsequent
	(optional, depending on application semantics) Reflexive
	Interest sending.
        </t>
        <t indent="0" pn="section-4.5-2">
	When sending a Reflexive Interest back to the consumer, the
	producer MUST construct a corresponding Interest name based on
	the RNP and insert the received Forward PIT Token (FPT) as the
	Reverse PIT Token (RPT) TLV in the reflexive Interest.
        </t>
      </section>
      <section anchor="forwarder-operation" numbered="true" removeInRFC="false" toc="include" pn="section-4.6">
        <name slugifiedName="name-forwarder-operation">Forwarder Operation</name>
        <t indent="0" pn="section-4.6-1">
	The forwarder operation for CCNx and/or NDN is changed in the
	following respects when supporting Reflexive Interests. The requirements are slightly different for
	a simple forwarder meeting the mandatory aspects of the specification, versus a forwarder designed for high-performance, 
	as discussed later in <xref target="PIT-sharding" format="default" sectionFormat="of" derivedContent="Section 6.1.1"/>. The main differences are in how PIT lookups are done, and whether
	the forwarder only does the steps necessary to process the PIT Tokens supplied by upstream and downstream forwarders, or whether it also generates and processes its own PIT Tokens.</t>
        <ol indent="adaptive" spacing="normal" start="1" type="1" pn="section-4.6-2">
      <li pn="section-4.6-2.1" derivedCounter="1.">
            <t indent="0" pn="section-4.6-2.1.1">Upon receiving an Interest containing a Reflexive Name Prefix (RNP) TLV a forwarder MAY check its CS for a matching Data Object. if a match is found, the corresponding Data is returned and the Reflexive Interest is considered satisfied. If no match is found, proceed with the following steps.</t>
            <t indent="0" pn="section-4.6-2.1.2"><strong>Note:</strong> Given that reflexive interests initiate exchanges constrained by the Interest Lifetime of the enclosing Interest/Data exchange, the value of caching the Data responses in forwarders is for short-term recovery from lost packets as opposed to optimizing longer term caching gain. For this reason we avoid mandating or strongly recommending the CS check for reflexive interests.</t>
          </li>
          <li pn="section-4.6-2.2" derivedCounter="2.">
		The forwarder then MUST record the RNP as an element of	the PIT entry for that Interest. (For interactions with	Interest aggregation, also see <xref target="interest-aggregation" format="default" sectionFormat="of" derivedContent="Section 6.1.3"/>).
      </li>
          <li pn="section-4.6-2.3" derivedCounter="3.">
	When forwarding an Interest with a Reflexive Name Prefix
	(RNP) TLV, the forwarder MAY generate a Forward PIT Token
	(FPT) and append it to the forwarded Interest to be processed
	by the next hop.
      </li>
          <li pn="section-4.6-2.4" derivedCounter="4.">
	If an Interest contains a Reverse PIT Token (RPT), the forwarder MAY use that
	value to access the corresponding PIT entry, or do a direct lookup based on the 
	Reflexive Interest Name.
      </li>
          <li pn="section-4.6-2.5" derivedCounter="5.">
	The forwarders MUST check that the high-order Name segment of the Interest is of
	type Reflexive Name Segment. If not, while this could strictly speaking be
	considered an error, the forwarder SHOULD simply process the Interest as a normal
	non-reflexive Interest and skip the steps below. A match
	indicates that this is a Reflexive Interest corresponding to
	the original consumer to producer Interest, so execute the
	following steps.
      </li>
          <li pn="section-4.6-2.6" derivedCounter="6.">
	Create a new PIT entry for the Reflexive Interest (if
	resources are sufficient). Also, see <xref target="PIT-sharding" format="default" sectionFormat="of" derivedContent="Section 6.1.1"/> for how PIT sharding interacts with
	the location and creation of PIT entries on high-speed forwarders.
      </li>
          <li pn="section-4.6-2.7" derivedCounter="7.">
	Record the Forward PIT-Token (FPT), if any, in this PIT entry, as would
	be done for any received Interest containing an FTP TLV.
      </li>
          <li pn="section-4.6-2.8" derivedCounter="8.">
            <t indent="0" pn="section-4.6-2.8.1">Look up the ingress face from the originating Interest's PIT
	entry, forward the Reflexive Interest on this face, with the following modifications:</t>
            <ul bare="false" empty="false" indent="3" spacing="normal" pn="section-4.6-2.8.2">
              <li pn="section-4.6-2.8.2.1">Append the the RPT from the ingress face information of the original Interest's
			PIT entry, if any</li>
              <li pn="section-4.6-2.8.2.2">If the downstream forwarder desires the upstream forwarder to supply an RPT in any returning Data Packet for this Reflexive interest, optionally append a FPT TLV to the Interest.</li>
            </ul>
          </li>
        </ol>
        <t indent="0" pn="section-4.6-3">
      The PIT entry for the Reflexive Interest is consumed per regular
      Interest/Data message forwarding requirements. The PIT entry for
      the originating Interest (that communicated the Reflexive
      Interest Name) is also consumed by a final Data message from the
      producer to the original consumer.
      <!-- dku: could say something about PIT entry expiry times and
	   more experimentation that should be conducted -->
        </t>
        <section anchor="forwarder-pseudocode" numbered="true" removeInRFC="false" toc="include" pn="section-4.6.1">
          <name slugifiedName="name-forwarder-algorithms-in-pse">Forwarder algorithms in pseudocode</name>
          <t indent="0" pn="section-4.6.1-1">This section provides some pseudocode examples to further explain the details of forwarder operation.
    	It has separate code paths for minimal forwarder operations and those needed by high-performance forwarders as is
    	further discussed in <xref target="PIT-sharding" format="default" sectionFormat="of" derivedContent="Section 6.1.1"/>.</t>
          <section numbered="true" removeInRFC="false" toc="include" pn="section-4.6.1.1">
            <name slugifiedName="name-processing-of-a-normal-inte">Processing of a normal Interest containing a Reflexive Name Prefix TLV</name>
            <sourcecode type="pseudocode" markers="false" pn="section-4.6.1.1-1">
Create PIT entry for Interest;
IF interest contains FPT
    Record FPT along with ingress face to use as RPT later;
    Record RNP in PIT entry;
EITHER
    Create entry in an RNP look-aside table with RNP value;
OR
    Generate a FPT for this PIT entry and add to Interest;
Forward Interest upstream;
</sourcecode>
          </section>
          <section numbered="true" removeInRFC="false" toc="include" pn="section-4.6.1.2">
            <name slugifiedName="name-processing-of-a-reflexive-i">Processing of a Reflexive Interest</name>
            <sourcecode type="pseudocode" markers="false" pn="section-4.6.1.2-1">
IF Interest contains an RPT
    use RPT to lookup up PIT entry for original interest;
ELSE
    Use RNP of Interest's Name TLV to lookup original Interest PIT entry;

IF PIT entry of original Interest not is found
    Issue an Interest Return with "No Route" error back to the producer;
    RETURN;
ELSE
    Create PIT entry for Reflexive Interest;

IF RNP of Reflexive Interest matches RNP in PIT entry
    BEGIN
    Extract FPT from Original Interest PIT entry (if any);
    Add FPT to Reflexive interest as RPT for downstream forwarder;
    Optionally, generate and add FPT for the Reflexive Interest for returning Data
    END;
ELSE
    Process as a normal Interest;
</sourcecode>
          </section>
        </section>
      </section>
      <section anchor="state-coupling" numbered="true" removeInRFC="false" toc="include" pn="section-4.7">
        <name slugifiedName="name-state-coupling-between-prod">State coupling between producer and consumer</name>
        <t indent="0" pn="section-4.7-1">
    A consumer that wishes to use this scheme MUST utilize one of the
    reflexive naming options defined in <xref target="naming" format="default" sectionFormat="of" derivedContent="Section 4.4"/> and
    include it in the corresponding Interest message. The Reflexive
    Name TLV <em>and</em> the full name of the requested data object
    (that identifies the producer) identify the common state shared by
    the consumer and the producer. When the producer responds by
    sending Interests with a Reflexive Name Prefix, the original
    consumer therefore has sufficient information to map these
    Interests to the ongoing Interest-Data exchange.</t>
        <t indent="0" pn="section-4.7-2">
      The exchange is finished when the producer who received the
      original Interest message responds with a Data message (or an
      Interest Return message in the case of error) answering the
      original Interest. After sending this Data message, the producer
      SHOULD destroy the corresponding shared state.  It MAY decide to
      use a timer that will trigger a later state destruction. After
      receiving this Data message, the originating consumer MUST
    destroy the corresponding Interest-Data exchange state.</t>
      </section>
    </section>
    <section numbered="true" removeInRFC="false" toc="include" pn="section-5">
      <name slugifiedName="name-use-cases-for-reflexive-int">Use cases for Reflexive Interests</name>
      <section anchor="RMI" numbered="true" removeInRFC="false" toc="include" pn="section-5.1">
        <name slugifiedName="name-achieving-remote-method-inv">Achieving Remote Method Invocation with Reflexive Interests</name>
        <!--<t><strong>TBD.</strong> Recapitulate what RICE does... </t>-->

      <t indent="0" pn="section-5.1-1">
	RICE (Remote Method Invocation in ICN) <xref target="Krol2018" format="default" sectionFormat="of" derivedContent="Krol2018"/> used a similar Reflexive Interest Forwarding
	scheme that inspired the design specified in this document (similar to the original design captured in <xref target="fib-based-design" format="default" sectionFormat="of" derivedContent="Appendix A.1"/>).
        </t>
        <t indent="0" pn="section-5.1-2">
	In RICE, the original Interest denotes the remote method (plus
	potential parameters) to be invoked at a producer
	(server). Before committing any computing resources, the
	server can then request authentication credentials and
	(optional) parameters using reflexive Interest-Data exchanges.
        </t>
        <t indent="0" pn="section-5.1-3">
	When the server has obtained the necessary credentials and
	input parameters, it can decide to commit computing
	resources, starts the compute process, and returns a handle
	("Thunk") in the final Data message to the original consumer
	(client).
        </t>
        <t indent="0" pn="section-5.1-4">
	The client would later request the computation results using a
	regular Interest-Data exchange (outside the Reflexive-Interest
	transaction), using the Thunk as a name for the computation
	result.
        </t>
        <t indent="0" pn="section-5.1-5">
	<xref target="rice-message-flow" format="default" sectionFormat="of" derivedContent="Figure 3"/> depicts an abstract message
	diagram for RICE. In addition to the 4-way Reflexive
	Forwarding Handshake (see <xref target="overall-message-flow" format="default" sectionFormat="of" derivedContent="Figure 2"/> for the details of the
	interaction), RICE adds another (standard) ICN Interest/Data
	exchange for transmitting the RMI result. The Thunk name is
	provided to the consumer in the D1 DATA message (answering the
	initial I1 Interest).
        </t>
        <figure anchor="rice-message-flow" align="left" suppress-title="false" pn="figure-3">
          <name slugifiedName="name-rice-message-flow">RICE Message Flow</name>
          <artwork type="ascii-art" align="left" pn="section-5.1-6.1" originalSrc="rice2.txt">+-----------+              +-----------+
| Consumer  |              | Producer  |
+-----------+              +-----------+
      |                          |
      | I1                       |
      |-------------------------&gt;|
      |                          | ---------------------\
      |                          |-| Requesting request |
      |                          | | parameters         |
      |                          | | and credentials    |
      |                          | |--------------------|
      |                          |
      |                      RI1 |
      |&lt;-------------------------|
      |                          |
      | RD1                      |
      |-------------------------&gt;|
      |                          | --------------------\
      |                          |-| Commit compute    |
      |                          | | resources,        |
      |                          | | return Thunk name |
      |                          | |-------------------|
      |                          |
      |                       D1 |
      |&lt;-------------------------|
      |                          | ----------------\
      |                          |-| Invoke Remote |
      |                          | | Method        |
      |                          | |---------------|
      | -------------------\     |
      |-| After some time, |     |
      | | request result   |     |
      | |------------------|     |
      |                          |
      | I2                       |
      |-------------------------&gt;|
      |                          |
      |                       D2 |
      |&lt;-------------------------|
      |                          |
</artwork>
          <artwork type="ascii-art" align="left" pn="section-5.1-6.2">
    Legend:
    I1: Interest #1 containing the Reflexive Name Prefix TLV
    D1: Data message, answering initiating I1 Interest,
        returning Thunk name
    RI1: Reflexive Interest issued by producer
    RD1: Data message, answering RI (parameters, credentials)
    I2: Regular Interest for Thunk (compute result)
    D2: Data message, answering I2
</artwork>
        </figure>
      </section>
      <section anchor="web" numbered="true" removeInRFC="false" toc="include" pn="section-5.2">
        <name slugifiedName="name-restful-web-interactions">RESTful Web Interactions</name>
        <t indent="0" pn="section-5.2-1">
	In todays HTTP-based web, RESTful (Representational State
	Transfer) web interactions are realized by sending requests in
	a client/server interaction, where the requests provides the
	application context (or a reference to it). It has been noted
	in <xref target="Moiseenko2014" format="default" sectionFormat="of" derivedContent="Moiseenko2014"/> that corresponding requests
	often exceed the response messages in size, and that this
	raises the problems noted in <xref target="push-problems" format="default" sectionFormat="of" derivedContent="Section 1.1"/> 
	when attempting to map such exchanges directly to CCNx/NDN.
        </t>
        <t indent="0" pn="section-5.2-2">
	Another reason not to include all request parameters in a
	(possibly encrypted) Interest message is the fact that a
	server (that is serving thousands of clients) would be obliged
	to receive, possibly decrypt and parse the complete requests
	before being able to determine whether the requestor is
	authorized, whether the request can be served etc. Many
	non-trivial requests could thus lead to computational overload
	attacks.
        </t>
        <t indent="0" pn="section-5.2-3">
	Using Reflexive Interest Forwarding for RESTful Web
	Interactions would encode the REST request in the original
	request, together with a Reflexive Interest Prefix that the
	server could then use to get back to the client for
	authentication credentials and request parameters, such as
	cookies. The request result (response message) could either be
	transmitted in the Data message answering the original
	request, or — in case of dynamic, longer-running computations
	— in a seperate Interest/Data exchange, potentially
	leveraging the Thunk scheme described in <xref target="RMI" format="default" sectionFormat="of" derivedContent="Section 5.1"/>.
        </t>
        <t indent="0" pn="section-5.2-4">
	Unlike approaches where clients have to signal a globally
	routable prefix to the network, this approach would not
	require the client (original consumer) to expose its identity
	to the network (the network only sees the temporary Reflexive
	Name Prefix), but it would still be possible to
	authenticate the client at the server.</t>
        <t indent="0" pn="section-5.2-5">An initial design for achieving RESTful ICN that employs reflexive forwarding is presented in <xref target="Kutscher2022" format="default" sectionFormat="of" derivedContent="Kutscher2022"/>.</t>
      </section>
      <section anchor="phone-home" numbered="true" removeInRFC="false" toc="include" pn="section-5.3">
        <name slugifiedName="name-achieving-simple-data-pull-">Achieving simple data pull from consumers with reflexive Interests</name>
        <t indent="0" pn="section-5.3-1">
	An oft-cited use case for ICN network architectures is
	<em>Internet of Things</em> (IoT), where the sources of data
	are limited-resource sensor/actuators. Many approaches have
	been tried (e.g. <xref target="Baccelli2014" format="default" sectionFormat="of" derivedContent="Baccelli2014"/>, <xref target="Lindgren2016" format="default" sectionFormat="of" derivedContent="Lindgren2016"/>, <xref target="Gundogan2018" format="default" sectionFormat="of" derivedContent="Gundogan2018"/>) with
	varying degrees of success in addressing the issues outlined
	in <xref target="push-problems" format="default" sectionFormat="of" derivedContent="Section 1.1"/>. The reflexive forwarding
	extension may substantially ameliorate the documented
	difficulties by allowing a different model for the basic
	interaction of sensors with the ICN network.
        </t>
        <t indent="0" pn="section-5.3-2">
	Instead of simply acting as a producer (either directly to the
	Internet or indirectly through the use of some form of
	application-layer gateway), the IoT device need only act as a
	consumer to initiate commuhication. When it has data to provide, it issues a
	"phone-home" Interest message to a pre-configured rendezvous
	name (e.g. an application-layer gateway or ICN <xref target="Chen2015" format="default" sectionFormat="of" derivedContent="Chen2015">Repo</xref>) and provides a reflexive name
	prefix TLV for the data it wishes to publish. The target
	producer may then issue the necessary reflexive Interest
	message(s) to fetch the data. Once fetched, validated, and
	stored, the producer then responds to the original Interest
	message with a success indication, possibly containing a Data
	object if needed to allow the originating device to modify its
	internal state. Alternatively, the producer might choose to
	not respond and allow the original Interest to time out,
	although this is NOT RECOMMENDED except in cases where the
	extra message transmission bandwith is at a premium compared
	to the persistence of stale state in the forwarders. We note
	that this interaction approach mirrors the earlier efforts using
	Interest-Interest-Data designs.
        </t>
        <t indent="0" pn="section-5.3-3">
	<xref target="phonehome-message-flow" format="default" sectionFormat="of" derivedContent="Figure 4"/> depicts this
	interaction with the (optional) D1 message. See <xref target="overall-message-flow" format="default" sectionFormat="of" derivedContent="Figure 2"/> for the details of the
	general Reflexive Forwarding interaction.
        </t>
        <figure anchor="phonehome-message-flow" align="left" suppress-title="false" pn="figure-4">
          <name slugifiedName="name-phone-home-message-flow">"Phone Home" Message Flow</name>
          <artwork type="ascii-art" align="left" pn="section-5.3-4.1" originalSrc="phonehome.txt">             +-----------+         +-----------+
             | Consumer  |         | Producer  |
             +-----------+         +-----------+
     ------------\ |                     |
     | new IoT   |-|                     |
     | data item | |                     |
     | produced  | |                     |
     |-----------| |                     |
  ---------------\ |                     |
  | "phone home" |-|                     |
  | by notifying | |                     |
  | producer     | |                     |
  |--------------| |                     |
                   |                     |
                   | I1                  |
                   |--------------------&gt;|
                   |                     | --------------------\
                   |                     |-| generate Interest |
                   |                     | | for IoT data      |
                   |                     | |-------------------|
                   |                     |
                   |                 RI1 |
                   |&lt;--------------------|
-----------------\ |                     |
| send requested |-|                     |
| data object    | |                     |
|----------------| |                     |
                   |                     |
                   | RD1                 |
                   |--------------------&gt;|
                   |                     | -----------------------\
                   |                     |-| finalize interaction |
                   |                     | | with optional        |
                   |                     | | Data message         |
                   |                     | |----------------------|
                   |                     |
                   |       D1 (optional) |
                   |&lt;--------------------|
                   |                     |
</artwork>
          <artwork type="ascii-art" align="left" pn="section-5.3-4.2">
    Legend:
    I1: Interest #1 containing the Reflexive Name Prefix TLV
    D1: Data message (OPTIONAL), finalizing interaction
    RI1: Reflexive Interest requesting the IoT data
    RD1: Data message, answering RI, returning IoT data object
    D1: (optional) Data answering I1
</artwork>
        </figure>
        <t indent="0" pn="section-5.3-5">
	There are two approaches that the IoT device can use for
	its response to a reflexive Interest. It can simply construct
	a Data Message bound through the usual ICN hash name to the
	reflexive Interest name. Since the scope of any data object
	bound in this way is only the duration of the enclosing
	Interest-Data exchange (see <xref target="consumer-implementation" format="default" sectionFormat="of" derivedContent="Section 6.2"/>) the producer would need to
	itself construct any persistent Data object, name it, and sign
	it. This is sometimes the right approach, as for some
	applications the identity of the originating IoT device is not
	important from an operational or security point of view; in
	contrast the identity of the gateway or Repo is what matters.
        </t>
        <t indent="0" pn="section-5.3-6">
	If alternatively, the persistent Data object should be bound
	from a naming and security point of view to the originating
	IoT device, this can be easily accomplished. Instead of
	directly placing the content in a Data object responding to
	the reflexive Interest as above, the consumer encapsulates a
	complete CCNx/NDN Data message (which includes the desired name
	of the data) in the response to the reflexive Interest
	message.
<!--
	<cref source="DO" display="false">
	  We may need to think if this exacerbates poisoning/pollution
	  attacks - I think not but need to noodle on this a bit.
	</cref>
-->
        </t>
        <t indent="0" pn="section-5.3-7">
	The interaction model described above brings a number
	potential advantages, some obvious, some less so. We enumerate
	a few of them as follows:
        </t>
        <ul bare="false" empty="false" indent="3" spacing="normal" pn="section-5.3-8">
          <li pn="section-5.3-8.1">
	  By not requiring the IoT device to be actively listening for
	  Interests, it can sleep and only wake up if it has something
	  to communicate. Conversely, parties interested in obtaining
	  data from the device do not need to be constantly polling in
	  order to ascertain if there is new data available.
	</li>
          <li pn="section-5.3-8.2">
	  No forwarder resources are tied up with state apart from the
	  actual reflexive forwarding interactions. All that is needed
	  is enough routing state in the FIB to be able to forward the
	  "phone home" Interest to an appropriate target
	  producer. While this model does not provide all the richness
	  of a full Pub/Sub system (like that described in <xref target="Gundogan2018" format="default" sectionFormat="of" derivedContent="Gundogan2018"/>) we argue it is adequate for a large
	  subclass of such applications.
	</li>
          <li pn="section-5.3-8.3">
	  The reflexive interest, through either a name suffix or
	  Interest payload, can give the IoT device useful context
	  from which to craft its Data object in response. One highly
	  useful parameter would be a robust clock value for the
	  device to use as a timestamp of the data, possibly as part
	  of its name, to correctly place it in a time seres of sensor
	  readings. This substantially alleviates the need for low-end
	  devices to have a robust time base, as long as they trust
	  the producer they contact to provide it.
	</li>
        </ul>
      </section>
      <!--
      <section anchor="state-synchronization"><name>Achieving peer state synchronization with Reflexive Interests</name>
      <t><cref source="DO"><strong>TBD.</strong> Talk about peer session establishment,
	Authz, key exchange, perhaps other use cases?</cref></t>
      </section>
-->
  </section>
    <section anchor="implementation-considerations" numbered="true" removeInRFC="false" toc="include" pn="section-6">
      <name slugifiedName="name-implementation-consideratio">Implementation Considerations</name>
      <t indent="0" pn="section-6-1">There are a number of important aspects to the reflexive
	  forwarding design which affect correctness and performance
	  of existing forwarder, consumer, and producer
	  implementations desiring to support it. This section
	  discusses the effect of each of these elements on the
	  CCNx/NDN protocol architecture.</t>
      <section anchor="forwarder-implementation" numbered="true" removeInRFC="false" toc="include" pn="section-6.1">
        <name slugifiedName="name-forwarder-implementation-co">Forwarder implementation considerations</name>
        <section anchor="PIT-sharding" numbered="true" removeInRFC="false" toc="include" pn="section-6.1.1">
          <name slugifiedName="name-interactions-with-input-pro">Interactions with Input Processing of Interest and Data packets</name>
          <t indent="0" pn="section-6.1.1-1">Reflexive Interests are designed specifically to be no
      	    different from any other Interest other than the use of
      	    the Reflexive Name Segment type as their
      	    high-order name segment. This means that a forwarder
      	    does not have to have special handling in terms of
      	    creation, and destruction, and other Interest processing
      	    needs such as timeouts, Interest satisfaction, and caching
      	    of returning data in the CS if desired. However, this
      	    design does require additional processing for Reflexive
      	    Interests not needed in the absence of reflexive
      	    forwarding. The most significant requirements are:</t>
          <ul bare="false" empty="false" indent="3" spacing="normal" pn="section-6.1.1-2">
            <li pn="section-6.1.1-2.1">
	    In order to locate the corresponding PIT entry for the
	    original Interest, the forwarder's packet input processing
	    needs to be able to efficiently locate the PIT entry of the original 
	    Interest that contained the RNP TLV.
	  </li>
            <li pn="section-6.1.1-2.2">
	    Ensure that the high order name segment of the Reflexive
	    Interest matches the RNP stored in that PIT entry.
	  </li>
          </ul>
          <t indent="0" pn="section-6.1.1-3">There are a few additional considerations to highlight for
    	high-speed forwarders however; these are discussed in the
    	following paragraphs.</t>
          <t indent="0" pn="section-6.1.1-4">In order to achieve forwarding scalability, high speed
      	forwarders need to exploit available parallelism in both CPU
      	(through multiple cores) and memory (through multiport DRAM
      	and limiting accesses to both DRAM and L3 caches). One
      	commonly-used technique is <em>PIT sharding</em>, where the
      	forwarder-global PIT is partitoned among cores such that all
      	processing of both Interest and Data for a given Name is
      	directed at the same core, optimizing both L1 I-cache
      	utilization and L2/L3/DRAM throughput and latency. This is
      	achieved in a number of implementations (e.g. <xref target="So2013" format="default" sectionFormat="of" derivedContent="So2013"/>) by hashing the fullname in the Interest or
      	Data and using that hash to select the assigned processing
      	core (and associated memory banks). This efficiently
      	distributes the load and minimizes the number of memory
      	accesses other than to bytes of the input packet.</t>
          <t indent="0" pn="section-6.1.1-5">Straightforward input name hashing to achieve a sharded PIT
      	has one potentially undesirable side effect: the original
      	Interest containing the Reflexive Name Prefix TLV and any
      	resultant reflexive Interests issued by the producer will likely hash
      	to different PIT shards, making any pointers that need to be
      	traversed across shards or cross-shard updates expensive,
      	possibly dramatically so. One could either optimize those
      	accesses (as, for example, suggested in the discussion of
      	Interest Lifetime in <xref target="interest-lifetime" format="default" sectionFormat="of" derivedContent="Section 6.1.2"/>) or
      	add special input handling of reflexive interests to steer
      	them to the same shard as the original interest. This latter
      	technique is what we have specified by making the use of PIT
      	Tokens similar to those in <xref target="Shi2020" format="default" sectionFormat="of" derivedContent="Shi2020"/> an
      	important element of the design.</t>
        </section>
        <section anchor="interest-lifetime" numbered="true" removeInRFC="false" toc="include" pn="section-6.1.2">
          <name slugifiedName="name-interactions-with-interest-">Interactions with Interest Lifetime</name>
          <t indent="0" pn="section-6.1.2-1">If and when a producer decides to fetch data from
      		the consumer using one or more reflexive Interest-Data
      		exchanges, the total latency for the original
      		Interest-Data exchange is inflated, potentially by
      		multiple RTTs. It is difficult for a consumer to
      		predict the inflation factor when issuing the original
      		Interest, and hence there can be a substantial hazard
      		of that Interest lifetime expiring before completion
      		of the full multi-way exchange. This can result in
      		persistent failures, which is obviously highly
      		undesirable.</t>
          <t indent="0" pn="section-6.1.2-2">There is a fairly straightforward technique that
      		can be employed by forwarders to avoid these "false"
      		Interest lifetime expirations. In the absence of a
      		superior alternative technique, it is RECOMMENDED that
      		all forwarders implement the following algorithm.</t>
          <t indent="0" pn="section-6.1.2-3">If and when a reflexive Interest arrives matching
      		the original Interest's PIT entry, the forwarder examines the
      		Interest lifetime of the arriving reflexive
      		Interest. Call this value <em>IL<sub>r</sub></em>. The
      		forwarder computes MAX(<em>IL<sub>t</sub>,
      		(IL<sub>r</sub> * 1.5)</em>), and replaces
      		<em>IL<sub>t</sub></em> with this value. This in
      		effect ensures that the remaining Interest lifetime of
      		the original Interest accounts for the additional 1.5
      		RTTs that may occur as a result of the reflexive
      		Interest-Data exchange.</t>
          <aside pn="section-6.1.2-4">
            <t indent="0" pn="section-6.1.2-4.1">We note that this is not unduly
      			expensive in this design where the two PIT
      			entries are guaranteed to be in the same PIT
      			shard on a high speed forwarder. The earlier
      			design discussed in <xref target="FIB-and-interest-lifetime" format="default" sectionFormat="of" derivedContent="Appendix A.1.2"/> required
      			some additional gymnastics.</t>
          </aside>
          <t anchor="reflexive-producer-hazard" indent="0" pn="section-6.1.2-5">While the above
      		approach of inflating the interest lifetime of the
      		original Interest to accommodate the additional RTTs
      		of reflexive Interest-Data exchanges avoids the
      		timeout problem, this does introduce a new
      		vulnerability that must be dealt with. A Producer,
      		either through a bug or malicious intent, could keep
      		an originating Interest-Data exchange alive by
      		continuing to send reflexive Interests back to the
      		consumer, while the consumer had no way to terminate
      		the enclosing interaction (there is no "cancel
      		Interest" function in either NDN nor CCNx). To
      		eliminate this hazard, if the consumer rejects a
      		reflexive interest with a T_RETURN_PROHIBITED error,
      		the forwarder(s), in addition to satisfying the
      		coresponding PIT entry, MUST also delete the
      		RNP from the original Interest's PIT entry, thereby preventing any
      		further reflexive Interests from reaching the
      		consumer. This allows the enclosing Interest-Data
      		exchange to either time out or be correctly ended with
      		a Data message or Interest Return from the
      		Producer.</t>
        </section>
        <section anchor="interest-aggregation" numbered="true" removeInRFC="false" toc="include" pn="section-6.1.3">
          <name slugifiedName="name-interactions-with-interest-a">Interactions with Interest aggregation and multi-path/multi-destination forwarding</name>
          <t indent="0" pn="section-6.1.3-1">As with numerous other situations where multiple Interests
      	for the same named object arrive containing different
      	parameters (e.g. Interest Lifetime, QoS, payload hash) the
      	same phenomenon occurs for the reflexive Name Prefix TLV. If
      	Interests with different reflexive name prefix TLVs collide,
      	the forwarder MUST NOT aggregate these Interest messages and
      	instead MUST create a separate PIT entry for each. This in
      	turn means that a different Forward PIT-Token (FPT) will be
      	placed in the individual forwarded Interests.</t>
          <t indent="0" pn="section-6.1.3-2">Forwarders supporting multi-path forwarding may of course
      	exploit this capability for Interests with identical reflexive
      	name prefix TLVs, like any other Interests. There are two
      	sub-cases of multi-next hop behavior; regular multi-path
      	(where the split traffic reconverges further upstream) and
      	multi-destination (where it doesn’t and the Interest reaches
      	multiple producers).</t>
          <t indent="0" pn="section-6.1.3-3">For multi-path, since the Interests that converge upstream
	carry identical reflexive Interest name TLVs, they will get
	aggregated. The forwarder might, just as for any other
	Interest, decide to either do single or multi-path forwarding
	of that reflexive Interest. If sent multi-path in parallel,
	these also will reconverge on the inverse path and get
	aggregated. The inclusion of the Forward PIT-Token (FPT) in
	the forwarded Interest is unaffected by multi-path since it is
	only used on returning Data messages or Reflexive Interests to
	access the correct PIT entry.</t>
          <t indent="0" pn="section-6.1.3-4">For multi-destination, reflexive Interests might get issued
	by multiple producers, but they will carry the same reflexive
	name prefix and hence be forwarded using the ingress face of the same
	original Interest PIT entry until reaching the join point, at which they will get
	aggregated and thus handled identically to any other
	Interest(s) subject to aggregation.</t>
        </section>
      </section>
      <section anchor="consumer-implementation" numbered="true" removeInRFC="false" toc="include" pn="section-6.2">
        <name slugifiedName="name-consumer-implementation-con">Consumer Implementation Considerations</name>
        <section numbered="true" removeInRFC="false" toc="include" pn="section-6.2.1">
          <name slugifiedName="name-data-objects-returned-by-th">Data objects returned by the consumer to reflexive name Interests arriving from a producer</name>
          <t indent="0" pn="section-6.2.1-1">The Data objects returned to the producer in response to a
    	reflexive Interest are normal CCNx/NDN data objects. The object returned
    	in response to a reflexive Interest is named with its hash as the trailing
    	segment of the reflexive Interest name, and hence the scope
    	of the object is under most circumstances meaningful only for
    	the duration of the enclosing Interest-Data interaction. This
    	property is ideal for naming and securing data that is "part
    	of" the enclosing interaction — things like method arguments,
    	authenticators, and key exchange parameters, but not for the
    	creation and naming of objects intended to survive outside the
    	current interaction's scope (c.f. <xref target="phone-home" format="default" sectionFormat="of" derivedContent="Section 5.3"/>,
    	which describes how to provide globally-named objects using
    	encapsulation). In general, the consumer should use the
    	following guidelines in creating Data messages in response to
    	reflexive Interest messages from the producer.</t>
          <ol type="(%c)" indent="adaptive" spacing="normal" start="1" pn="section-6.2.1-2">
    			<li pn="section-6.2.1-2.1" derivedCounter="(a)">Set the recommended cache time (T_CACHETIME) either to zero, or a value no greater than the Interest lifetime (T_INTLIFE) of the original Interest messsage.</li>
            <li pn="section-6.2.1-2.2" derivedCounter="(b)">Set the payload type (T_PAYLDTYPE) according to the type of object being returned (e.g. object, link, manifest)</li>
            <li pn="section-6.2.1-2.3" derivedCounter="(c)">Set the expiry time (T_EXPIRY) to a value greater than <em>now</em>, and less than or equal to the <em>now</em> + Interest lifetime (T_INTLIFE) of the original Interest messsage.</li>
          </ol>
        </section>
        <section numbered="true" removeInRFC="false" toc="include" pn="section-6.2.2">
          <name slugifiedName="name-terminating-unwanted-reflex">Terminating unwanted reflexive Interest exchanges</name>
          <t indent="0" pn="section-6.2.2-1">A consumer may wish to stop receiving reflxive Interests due to possible erors or malicious behavior on the part of the producer. Therefore, if the consumer receives an unwanted reflexive Interest, it SHOULD reject that interest with a T_RETURN_PROHIBITED error (See section 10.3.6 of <xref target="RFC8609" format="default" sectionFormat="of" derivedContent="RFC8609"/> ). This will provoke the forwarders to prevent further reflexive Interests from reaching the consumer, as described above in <xref target="reflexive-producer-hazard" format="default" sectionFormat="of" derivedContent="Section 6.1.2, Paragraph 5"/>.</t>
        </section>
        <section numbered="true" removeInRFC="false" toc="include" pn="section-6.2.3">
          <name slugifiedName="name-interactions-with-caching">Interactions with caching</name>
          <t indent="0" pn="section-6.2.3-1">
	  The reflexive named objects provide "local", temporary names
	  that are only defined for one specific interaction between a
	  consumer and a producer. Corresponding Data objects MUST NOT
	  be shared among multiple consumers (violating this would require special gyrations by the producer since the reflexive Name utilizes per-consumer/per-interaction random values). A producer MUST NOT issue an Interest message for any reflexive name after it has sent the final Data message answering the original Interest.
          </t>
          <t indent="0" pn="section-6.2.3-2">
	  Forwarders MAY still cache reflexive Data objects for
	  retransmissions within a transactions, but they MUST invalidate or remove
	  them from the content store when they forward the final Data
	  message answering the original Interest.
          </t>
        </section>
      </section>
      <section anchor="producer-implementation" numbered="true" removeInRFC="false" toc="include" pn="section-6.3">
        <name slugifiedName="name-producer-implementation-con">Producer Implementation Considerations</name>
        <t indent="0" pn="section-6.3-1">Producers receiving an Interest with a Reflexive Name
	Segment, MAY decide to issue Reflexive Interests for the corresponding
	Data objects. All Reflexive Interest messages that a producer
	sends MUST be sent over the face that the original Interest
	was received on. </t>
      </section>
    </section>
    <section anchor="Ops" numbered="true" removeInRFC="false" toc="include" pn="section-7">
      <name slugifiedName="name-operational-considerations">Operational Considerations</name>
      <t indent="0" pn="section-7-1">This extension represents a substantial enhancement to the
	CCNx/NDN protocol architecture and hence has important forward
	and backward compatibility consequences. The most important of
	these is that correct operation of the scheme requires an
	unbroken chain of forwarders between the consumer and the
	desired producer that support the Reflexive Name Prefix TLV, the Forward and Backward PIT-Token TLVs and the
	corresponding forwarder capabilities specified in <xref target="forwarder-operation" format="default" sectionFormat="of" derivedContent="Section 4.6"/>. When this invariant is not
	satisfied, some means is necessary to detect and hopefully
	recover from the error. We have identified three possible
	approaches to handling the lack of universal deployment of
	forwarders supporting the reflexive forwarding scheme.</t>
      <t indent="0" pn="section-7-2">The first approach simply lets the producer detect the
	error by getting a "no route to destination" error when trying
	to send an Interest to a reflexive name. This will catch the
	error, but only after forwarding resources are tied up and the
	producer has done some work on the original Interest
	message. Further, the producer would need a bit of smarts to
	determine that this is a permanent error and not a transient
	to be retried. In order for the consumer to attempt recovery,
	there might be a need for some explicit error returned for the
	original interest to tell the consumer what the likely problem
	is. This approach does not enable an obvious recovery path for
	the consumer either, since if the producer cannot easily detect the error, 
	the consumer has no way to know if a retry has any chance of succeeding.</t>
      <t indent="0" pn="section-7-3">A second approach is to bump the CCNx/NDN protocol version
	to explicitly indicate the lack of compatability. Such
	Interests would be rejected by forwarders not supporting these
	protocol extensions. A consumer wishing to use the Reflexive
	Name Prefix TLV together with Reverse PIT-Tokens, would use the higher protocol version on those
	Interest messages (but could of course continue to use the
	current version number on other Interest messages). This is a
	big hammer, but may be called for in this situation
	because:</t>
      <ol type="(%c)" indent="adaptive" spacing="normal" start="1" pn="section-7-4">
		<li pn="section-7-4.1" derivedCounter="(a)">it detects the problem immediately and
		deterministically, and</li>
        <li pn="section-7-4.2" derivedCounter="(b)">one could assume an ICN routing protocol that
		would only forward to a next hop that supports the
		updated protocol version number. The supported
		forwarder protocol versions would have been
		communicated in the routing protocol ahead of
		time.</li>
      </ol>
      <t indent="0" pn="section-7-5">A third option is to, as a precondition to utilizing the
	protocol in a deployment, create and deploy a neighbor
	capability exchange protocol which will tell a downstream
	forwarder if the upstream can handle the new TLV. This might
	avoid the large hammer of updating the protocol version, but
	of course this puts a pretty strong dependency on somebody
	actually designing and publishing such a protocol! On the
	other hand, a neighbor capability exchange protocol for
	CCNx/NDN would have a number of other substantial benefits,
	which makes it worth seriously considering anyway.</t>
    </section>
    <section anchor="encoding" numbered="true" removeInRFC="false" toc="include" pn="section-8">
      <name slugifiedName="name-mapping-to-ccnx-and-ndn-pac">Mapping to CCNx and NDN packet encodings</name>
      <t indent="0" pn="section-8-1"/>
      <section anchor="CCNx-encoding" numbered="true" removeInRFC="false" toc="include" pn="section-8.1">
        <name slugifiedName="name-packet-encoding-for-ccnx">Packet encoding for CCNx</name>
        <t keepWithNext="true" indent="0" pn="section-8.1-1">For CCNx<xref target="RFC8609" format="default" sectionFormat="of" derivedContent="RFC8609"/> this specification defines
    one new Name Segment TLV type, and two hop-by-hop option TLVs.</t>
        <table align="center" pn="table-1">
          <name slugifiedName="name-reflexive-name-tlv">Reflexive Name TLV</name>
          <thead>
            <tr>
              <th align="center" colspan="1" rowspan="1">Abbrev</th>
              <th align="center" colspan="1" rowspan="1">Name</th>
              <th align="center" colspan="1" rowspan="1">Description</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left" colspan="1" rowspan="1">T_REFLEXIVE_NAME</td>
              <td align="left" colspan="1" rowspan="1">Reflexive Name Segment</td>
              <td align="left" colspan="1" rowspan="1">Name segment to use as name prefix in Reflexive Interest Messages</td>
            </tr>
          </tbody>
        </table>
        <table align="center" pn="table-2">
          <name slugifiedName="name-hop-by-hop-pit-token-tlvs">Hop-by-hop PIT Token TLVs</name>
          <thead>
            <tr>
              <th align="center" colspan="1" rowspan="1">Abbrev</th>
              <th align="center" colspan="1" rowspan="1">Name</th>
              <th align="center" colspan="1" rowspan="1">Description</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left" colspan="1" rowspan="1">T_FPT</td>
              <td align="left" colspan="1" rowspan="1">Forward PIT TOKEN</td>
              <td align="left" colspan="1" rowspan="1">1-32 byte value chosen by the forwarder for a PIT entry communicated upstream
				toward a producer</td>
            </tr>
            <tr>
              <td align="left" colspan="1" rowspan="1">T_RPT</td>
              <td align="left" colspan="1" rowspan="1">Reverse PIT TOKEN</td>
              <td align="left" colspan="1" rowspan="1">1-32 byte value placed in either a Data packet or a Reflexive Interest packet by
				a producer or forwarder to allow the downstream forwarder to access the PIT entry
				identified by a received forward PIT Token (FPT)</td>
            </tr>
          </tbody>
        </table>
      </section>
      <section anchor="NDN-encoding" numbered="true" removeInRFC="false" toc="include" pn="section-8.2">
        <name slugifiedName="name-packet-encoding-for-ndn">Packet encoding for NDN</name>
        <t indent="0" pn="section-8.2-1"><strong>These are proposed assignments based on <xref target="NDNTLV" format="default" sectionFormat="of" derivedContent="NDNTLV"/>. Suggestions from the NDN team 
      would be greatly appreciated.</strong></t>
        <section numbered="true" removeInRFC="false" toc="include" pn="section-8.2.1">
          <name slugifiedName="name-reflexive-name-component-ty">Reflexive Name Component Type</name>
          <t indent="0" pn="section-8.2.1-1">The NDN Name component TLVs needs to have a new component type added with type RNP (for reflexive name prefix). We suggest something like: <strong>TBD</strong></t>
          <aside pn="section-8.2.1-2">
            <t indent="0" pn="section-8.2.1-2.1"><strong>Note:</strong>It seems like the current 0.2.1 packet format only has allocated two name component types — a <em>GenericNameComponent</em> and a <em>ImplicitSha256DigestComponent</em>. Shouldn't there be more types by now or is this spec out of date?</t>
          </aside>
        </section>
        <section numbered="true" removeInRFC="false" toc="include" pn="section-8.2.2">
          <name slugifiedName="name-reflexive-name-prefix-tlv">Reflexive Name Prefix TLV</name>
          <t indent="0" pn="section-8.2.2-1">The Reflexive Name Prefix TLV needs to be added to the NDN Interest packet format. We suggest using <xref target="RFC4122" format="default" sectionFormat="of" derivedContent="RFC4122"/>, hence something like:</t>
          <table align="center" pn="table-3">
            <name slugifiedName="name-proposed-reflexive-name-pre">Proposed Reflexive Name Prefix TLV for NDN Interest Packet</name>
            <tbody>
              <tr>
                <td align="left" colspan="1" rowspan="1">RNP ::=</td>
                <td align="left" colspan="1" rowspan="1">RNP-TYPE</td>
                <td align="left" colspan="1" rowspan="1">TLV-LENGTH(=16) BYTE8)</td>
              </tr>
            </tbody>
          </table>
        </section>
        <section numbered="true" removeInRFC="false" toc="include" pn="section-8.2.3">
          <name slugifiedName="name-pit-tokens-for-ndnlpv2">PIT Tokens for NDNLPv2</name>
          <t indent="0" pn="section-8.2.3-1">The current NDN Link Protocol current has an assignment for the PIT Token mechanism pioneered in <xref target="Shi2020" format="default" sectionFormat="of" derivedContent="Shi2020"/>. That approach only needed a single field, since PIT Tokens are only used to express one "direction" — for consumer-to-producer Interests and producer-to-consumer Data messages. This specification employs PIT Tokens not only on enclosing Interest-Data exchanges, but also on Reflexive Interests to locate the PIT entry of an enclosing Interest on reception by a forwarder. Therefore we suggest that the existing NDNLPv2 assignment of</t>
          <table align="center" pn="table-4">
            <name slugifiedName="name-current-ndnlpv2-pit-token-a">Current NDNLPv2 PIT Token assignment</name>
            <tbody>
              <tr>
                <td align="left" colspan="1" rowspan="1">LpHeaderField</td>
                <td align="left" colspan="1" rowspan="1">PitToken</td>
              </tr>
              <tr>
                <td align="left" colspan="1" rowspan="1">PitToken</td>
                <td align="left" colspan="1" rowspan="1">PIT-TOKEN-TYPE TLV-LENGTH 1*32OCTET&gt;</td>
              </tr>
            </tbody>
          </table>
          <t indent="0" pn="section-8.2.3-3">be renamed to indicate its use in the forward direction of consumer to producer Interests and returning Data, and a second allocation be done for a <em>Reverse PIT Token</em> specifically for inclusion in Reflexive Interests as follows:</t>
          <table align="center" pn="table-5">
            <name slugifiedName="name-proposed-ndnlpv2-reverse-pi">Proposed NDNLPv2 Reverse PIT Token assignment</name>
            <tbody>
              <tr>
                <td align="left" colspan="1" rowspan="1">LpHeaderField</td>
                <td align="left" colspan="1" rowspan="1">ReversePitToken</td>
              </tr>
              <tr>
                <td align="left" colspan="1" rowspan="1">ReversePitToken</td>
                <td align="left" colspan="1" rowspan="1">PIT-TOKEN-TYPE TLV-LENGTH 1*32OCTET&gt;</td>
              </tr>
            </tbody>
          </table>
        </section>
      </section>
    </section>
    <section anchor="IANA" numbered="true" removeInRFC="false" toc="include" pn="section-9">
      <name slugifiedName="name-iana-considerations">IANA Considerations</name>
      <section numbered="true" removeInRFC="false" toc="include" pn="section-9.1">
        <name slugifiedName="name-reflexive-name-prefix-tlv-2">Reflexive Name Prefix TLV</name>
        <t indent="0" pn="section-9.1-1">Please add the T_REFLEXIVE_NAME segment TLV type to the CCNx Name Segment Types TLV types registry of <xref target="RFC8609" format="default" sectionFormat="of" derivedContent="RFC8609"/> (see <eref target="https://www.iana.org/assignments/ccnx/ccnx.xhtml#ccnx-name-segment-types" brackets="none"/>), with Length 16 bytes and type of 128 bit random value. </t>
        <aside pn="section-9.1-2">
          <t indent="0" pn="section-9.1-2.1">If possible, please assign the value 0x0003 for this TLV type</t>
        </aside>
        <figure anchor="reflexive-name-encoding" align="left" suppress-title="false" pn="figure-5">
          <name slugifiedName="name-reflexive-name-segment-type">Reflexive Name segment type</name>
          <artwork align="left" pn="section-9.1-3.1">
                     1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+---------------+---------------+---------------+
|         T_REFLEXIVE_NAME      |               16              |
+---------------+---------------+---------------+---------------+
|                                                               |
|       128 bit value randomly assigned by consumer             |
+-------------------------------+-------------------------------+
</artwork>
        </figure>
      </section>
      <section numbered="true" removeInRFC="false" toc="include" pn="section-9.2">
        <name slugifiedName="name-forward-and-reverse-pit-tok">Forward and Reverse PIT-Token hop-by-hop option TLVs</name>
        <t indent="0" pn="section-9.2-1">Please add the T_FPT and T_RPT TLVs to the CCNx Hop-by-Hop Type Registry of <xref target="RFC8609" format="default" sectionFormat="of" derivedContent="RFC8609"/> (see <eref target="https://www.iana.org/assignments/ccnx/ccnx.xhtml#ccnx-hop-by-hop-types" brackets="none"/>), with Length 1-32 bytes and type of random value. </t>
        <aside pn="section-9.2-2">
          <t indent="0" pn="section-9.2-2.1">If possible, please assign the value 0x000A for T_FPT and 0x000B for T_RPT.</t>
        </aside>
        <figure anchor="Forward-PIT-token-TLV" align="left" suppress-title="false" pn="figure-6">
          <name slugifiedName="name-forward-pit-token-hop-by-ho">Forward PIT-Token hop-by-hop TLV</name>
          <artwork align="left" pn="section-9.2-3.1">
                     1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+---------------+---------------+---------------+
|             T_FPT             |               1-32            |
+---------------+---------------+---------------+---------------+
|                                                               |
|       1-32 byte value randomly assigned by forwarder          |
+-------------------------------+-------------------------------+
</artwork>
        </figure>
        <figure anchor="Reverse-PIT-token-TLV" align="left" suppress-title="false" pn="figure-7">
          <name slugifiedName="name-reverse-pit-token-hop-by-ho">Reverse PIT-Token hop-by-hop TLV</name>
          <artwork align="left" pn="section-9.2-4.1">
                     1                   2                   3
 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+---------------+---------------+---------------+---------------+
|             T_RPT             |               1-32            |
+---------------+---------------+---------------+---------------+
|                                                               |
|       1-32 byte value randomly assigned by forwarder          |
+-------------------------------+-------------------------------+
</artwork>
        </figure>
      </section>
    </section>
    <section anchor="Security" numbered="true" removeInRFC="false" toc="include" pn="section-10">
      <name slugifiedName="name-security-considerations">Security Considerations</name>
      <!--
        <t><cref source="DO"><strong>Possibly also talk about</strong>stuff from RICE on avoiding server overload.</cref></t>
-->
      	
      <t indent="0" pn="section-10-1">One of the major motivations for the reflexive forwarding
      extension specified in this document is in fact to enable better
      security and privacy characteristics for ICN networks. The main
      considerations are presented in <xref target="intro" format="default" sectionFormat="of" derivedContent="Section 1"/>, but we
      briefly recapitulate them here:</t>
      <ul bare="false" empty="false" indent="3" spacing="normal" pn="section-10-2">
        <li pn="section-10-2.1">Current approaches to authentication and data transfer
      	often use payloads in Interest messages, which are clumsy to
      	secure (Interest messages must be signed) and as a consequence
      	make it very difficult to ensure consumer privacy. Reflexive
      	forwarding moves all sensitive data to the Data messages sent
      	in response to reflexive Interests, which are secured in the
      	same manner as all other Data messages in the CCNx and NDN
      	protocol designs.</li>
        <li pn="section-10-2.2">In many scenarios, consumers are forced to also act as
      	producers so that data may be fetched by either a particular,
      	or arbitrary other party. The means the consumer must arrange
      	to have a routable name prefix and that prefix be disseminated
      	by the routing protocol or other means. This represents both a
      	privacy hazard (by revealing possible important information
      	about the consumer) and a security concern as it opens up the
      	consumer to the full panoply of flooding and crafted Interest
      	Denial of Service attacks.</li>
        <li pn="section-10-2.3">In order to achieve multi-way handshakes, in current
      	designs a consumer wishing a producer to communicate back must
      	inform the producer of what (globally routable) name to
      	use. This gives the consumer a convenient means to mount a
      	variety of reflection attacks by enlisting the producer to
      	send Interests to desired victims.</li>
      </ul>
      <t indent="0" pn="section-10-3">As a major protocol extension however, this design brings its
      own potential security issues, which are discussed in the
      following subsections.</t>
      <section numbered="true" removeInRFC="false" toc="include" pn="section-10.1">
        <name slugifiedName="name-collisions-of-reflexive-int">Collisions of reflexive Interest names</name>
        <t indent="0" pn="section-10.1-1">Reflexive Interest names are constructed using 128-bit random
      numbers. This is intended to ensure an off-path attacker cannot
      easily manufacture a matching reflexive Interest and either
      masquerade as the producer, or mount a denial of service attack
      on the consumer. It also limits tracking through the linkability
      of Interests containing a re-used random value.</t>
        <t indent="0" pn="section-10.1-2">Therefore consumers MUST utilize a robust means of generating
      these random values, and it is RECOMMENDED that the <xref target="RFC4122" format="default" sectionFormat="of" derivedContent="RFC4122"/> format
      be used, with a pseudo-random
      number generator (PRNG) approved for use with cryptographic
      protocols.</t>
      </section>
      <section numbered="true" removeInRFC="false" toc="include" pn="section-10.2">
        <name slugifiedName="name-additional-resource-pressur">Additional resource pressure on PIT and FIB</name>
        <t indent="0" pn="section-10.2-1">Normal Interest message processing in CCNx and NDN needs to
      consider effect of various resource depletion attacks on the
      PIT, particularly in the form of Interest flooding attacks (see
      <xref target="Gasti2012" format="default" sectionFormat="of" derivedContent="Gasti2012"/> for a good overview of DoS and DDoS
      mitigation on ICN networks). Interest messages utilizing this
      reflexive forwarding extension can place additional resource
      pressure on the PIT.</t>
        <t indent="0" pn="section-10.2-2">While this does not represent a new DoS/DDoS attack vector,
      the ability of a malicious consumer to utilize this extension in
      an attack does represent an increased risk of resource
      depletion, especially if such Interests are given unfair access
      to PIT and FIB resources. Implementers SHOULD therefore protect
      PIT and FIB resources by weighing requests for reflexive
      forwarding resources appropriately relative to other
      Interests.</t>
      </section>
      <section numbered="true" removeInRFC="false" toc="include" pn="section-10.3">
        <name slugifiedName="name-potential-vulnerabilities-f">Potential Vulnerabilities from the use of PIT Tokens</name>
        <t indent="0" pn="section-10.3-1">By including PIT Tokens in the CCNx or NDN protocol, an attacker has the opportunity to manipulate these values by either replacement or elision. So far we do not have enough experimental data nor formal security analysis to assess whether useful attacks against the protocol via the PIT Tokens can be mounted. The fields are carried differently in CCNx and NDN, but in both cases they are outside the cryptographic integrity envelope and not encrypted for confidentiality as part of the base protocols.</t>
        <t indent="0" pn="section-10.3-2">For both cases however, the potential vulnerabilities can be foiled, at least for point-to-point communication over an L2 hop, by employing either link-layer encryption (in the case of CCNx), or by encrypting the NDNLPv2 protocol, which carries these fields for NDN.</t>
      </section>
      <section numbered="true" removeInRFC="false" toc="include" pn="section-10.4">
        <name slugifiedName="name-privacy-considerations">Privacy Considerations</name>
        <t indent="0" pn="section-10.4-1">ICN architectures like CCNx and NDN provide a rich tapestry
      of interesting privacy issues, which have been extensively
      explored in the research literature. The fundamental tradeoffs
      for privacy concern the risk of exposing the names of
      information objects to the forwarding elements of the network,
      which is a necessary property of any name-based routing and
      forwarding design. Numerous approaches have been explored with
      varying degrees of success, such as onion routing (<xref target="DiBenedettoGTU12" format="default" sectionFormat="of" derivedContent="DiBenedettoGTU12"/>), name encryption (<xref target="Ghali2017" format="default" sectionFormat="of" derivedContent="Ghali2017"/>), and name obfuscation (<xref target="Arianfar2011" format="default" sectionFormat="of" derivedContent="Arianfar2011"/>) among others.</t>
        <t indent="0" pn="section-10.4-2">Reflexive forwarding does not change the overall landscape
      	of privacy tradeoffs, nor seem to introduce additional
      	hazards. In fact, the privacy exposures are confined to the
      	inverse path of forwarders from the producer to the consumer,
      	through which the original Interest forwarding may have
      	already exposed names on path. Similar name privacy techniques
      	to those cited above may be equally applied to the names in
      	reflexive Interests.</t>
        <t indent="0" pn="section-10.4-3">While the individual reflexive Interest-Data exchanges have
      	similar properties to those in any NDN or CCNx exchange, the
      	target usages by applications may have interaction patterns
      	that are subject to relatively straightforward fingerprinting
      	by adversaries. For example, a particular remote method invocation may
      	fingerprint simply through the count of arguments fetched by
      	the producer and their sizes. The attacker must however be on
      	path, which somewhat ameliorates the exposure hazards.</t>
      </section>
    </section>
  </middle>
  <back>
    <references pn="section-11">
      <name slugifiedName="name-normative-references">Normative References</name>
      <reference anchor="RFC2119" target="https://www.rfc-editor.org/info/rfc2119" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml" quoteTitle="true" derivedAnchor="RFC2119">
        <front>
          <title>Key words for use in RFCs to Indicate Requirement Levels</title>
          <author fullname="S. Bradner" initials="S." surname="Bradner"/>
          <date month="March" year="1997"/>
          <abstract>
            <t indent="0">In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="2119"/>
        <seriesInfo name="DOI" value="10.17487/RFC2119"/>
      </reference>
      <reference anchor="RFC8174" target="https://www.rfc-editor.org/info/rfc8174" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8174.xml" quoteTitle="true" derivedAnchor="RFC8174">
        <front>
          <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
          <author fullname="B. Leiba" initials="B." surname="Leiba"/>
          <date month="May" year="2017"/>
          <abstract>
            <t indent="0">RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="8174"/>
        <seriesInfo name="DOI" value="10.17487/RFC8174"/>
      </reference>
      <reference anchor="RFC8569" target="https://www.rfc-editor.org/info/rfc8569" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8569.xml" quoteTitle="true" derivedAnchor="RFC8569">
        <front>
          <title>Content-Centric Networking (CCNx) Semantics</title>
          <author fullname="M. Mosko" initials="M." surname="Mosko"/>
          <author fullname="I. Solis" initials="I." surname="Solis"/>
          <author fullname="C. Wood" initials="C." surname="Wood"/>
          <date month="July" year="2019"/>
          <abstract>
            <t indent="0">This document describes the core concepts of the Content-Centric Networking (CCNx) architecture and presents a network protocol based on two messages: Interests and Content Objects. It specifies the set of mandatory and optional fields within those messages and describes their behavior and interpretation. This architecture and protocol specification is independent of a specific wire encoding.</t>
            <t indent="0">The protocol also uses a control message called an Interest Return, whereby one system can return an Interest message to the previous hop due to an error condition. This indicates to the previous hop that the current system will not respond to the Interest.</t>
            <t indent="0">This document is a product of the Information-Centric Networking Research Group (ICNRG). The document received wide review among ICNRG participants. Two full implementations are in active use and have informed the technical maturity of the protocol specification.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8569"/>
        <seriesInfo name="DOI" value="10.17487/RFC8569"/>
      </reference>
      <reference anchor="RFC8609" target="https://www.rfc-editor.org/info/rfc8609" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8609.xml" quoteTitle="true" derivedAnchor="RFC8609">
        <front>
          <title>Content-Centric Networking (CCNx) Messages in TLV Format</title>
          <author fullname="M. Mosko" initials="M." surname="Mosko"/>
          <author fullname="I. Solis" initials="I." surname="Solis"/>
          <author fullname="C. Wood" initials="C." surname="Wood"/>
          <date month="July" year="2019"/>
          <abstract>
            <t indent="0">Content-Centric Networking (CCNx) is a network protocol that uses a hierarchical name to forward requests and to match responses to requests. This document specifies the encoding of CCNx messages in a TLV packet format, including the TLV types used by each message element and the encoding of each value. The semantics of CCNx messages follow the encoding-independent CCNx Semantics specification.</t>
            <t indent="0">This document is a product of the Information Centric Networking research group (ICNRG). The document received wide review among ICNRG participants and has two full implementations currently in active use, which have informed the technical maturity of the protocol specification.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8609"/>
        <seriesInfo name="DOI" value="10.17487/RFC8609"/>
      </reference>
    </references>
    <references pn="section-12">
      <name slugifiedName="name-informative-references">Informative References</name>
      <!--		<xi:include "reference.I-D.irtf.icnrg.mapme.xml"?> -->
      <reference anchor="Arianfar2011" target="https://dl.acm.org/doi/10.1145/2018584.2018589" quoteTitle="true" derivedAnchor="Arianfar2011">
        <front>
          <title>On preserving privacy in content-oriented networks, in ICN '11: Proceedings of the ACM SIGCOMM workshop on Information-centric networking</title>
          <author surname="Arianfar" initials="S." fullname="Somaya Arianfar"/>
          <author surname="Koponen" initials="T." fullname="Teemu Koponen"/>
          <author surname="Raghavan" initials="B." fullname="Barath Raghavan"/>
          <author surname="Shenker" initials="S." fullname="Scott Shenker"/>
          <date month="August" year="2011"/>
        </front>
        <seriesInfo name="DOI" value="https://doi.org/10.1145/2018584.2018589"/>
      </reference>
      <reference anchor="Auge2018" target="https://ieeexplore.ieee.org/document/8267132" quoteTitle="true" derivedAnchor="Auge2018">
        <front>
          <title>MAP-Me: Managing Anchor-Less Producer Mobility in Content-Centric Networks, in IEEE Transactions on Network, Volume 15, Issue 2</title>
          <author surname="Augé" initials="J." fullname="Jordan Augé" asciiSurname="Auge" asciiFullname="Jordan Auge"/>
          <author surname="Carofiglio" initials="G." fullname="Giovanna Carofiglio"/>
          <author initials="G." surname="Grassi"/>
          <author initials="L." surname="Muscariello" fullname="Luca Muscariello"/>
          <author initials="G." surname="Pau" fullname="Giovanni Pau"/>
          <author initials="X." surname="Zeng"/>
          <date month="June" year="2018"/>
        </front>
        <seriesInfo name="DOI" value="10.1109/TNSM.2018.2796720"/>
      </reference>
      <reference anchor="Baccelli2014" target="https://dl.acm.org/doi/abs/10.1145/2660129.2660144" quoteTitle="true" derivedAnchor="Baccelli2014">
        <front>
          <title>Information centric networking in the IoT: experiments with NDN in the wild, in ACM-ICN '14: Proceedings of the 1st ACM Conference on Information-Centric Networking</title>
          <author surname="Baccelli" initials="E." fullname="Emmanuel Baccelli"/>
          <author surname="Mehlis" initials="C." fullname="Christian Mehlis"/>
          <author surname="Hahm" initials="O." fullname="Oliver Hahm"/>
          <author surname="Schmidt" initials="T." fullname="Thomas Schmidt"/>
          <author surname="Wählisch" initials="M." fullname="Matthias Wählisch" asciiSurname="Wahlisch" asciiFullname="Matthias Wahlisch"/>
          <date month="September" year="2014"/>
        </front>
        <seriesInfo name="DOI" value="10.1145/2660129.2660144"/>
      </reference>
      <reference anchor="Carzaniga2011" target="https://conferences.sigcomm.org/sigcomm/2011/papers/icn/p56.pdf" quoteTitle="true" derivedAnchor="Carzaniga2011">
        <front>
          <title>Content-Based Publish/Subscribe Networking and Information-Centric Networking</title>
          <author surname="Carzaniga" initials="A." fullname="Antonio Carzaniga"/>
          <author surname="Papalini" initials="M." fullname="Michele Papaline"/>
          <author surname="Wolf" initials="A.L." fullname="Alexander L. Wolf"/>
          <date month="September" year="2011"/>
        </front>
        <seriesInfo name="DOI" value="10.1145/2018584.2018599"/>
      </reference>
      <reference anchor="Chen2015" target="https://ieeexplore.ieee.org/document/7312154" quoteTitle="true" derivedAnchor="Chen2015">
        <front>
          <title>NDSS: A Named Data Storage System, in International Conference on Cloud and Autonomic Computing</title>
          <author surname="Chen" initials="S." fullname="Shuo Chen"/>
          <author surname="Cao" initials="J." fullname="Junwei Cao"/>
          <author surname="Zhu" initials="L." fullname="Lipeng Zhu"/>
          <date month="September" year="2014"/>
        </front>
        <seriesInfo name="DOI" value="10.1109/ICCAC.2015.12"/>
      </reference>
      <reference anchor="DiBenedettoGTU12" target="https://www.ndss-symposium.org/ndss2012/andana-anonymous-named-data-networking-application" quoteTitle="true" derivedAnchor="DiBenedettoGTU12">
        <front>
          <title>ANDaNA: Anonymous Named Data Networking Application, in NDSS 2012</title>
          <author surname="DiBenedetto" initials="S." fullname="Steve Benedetto"/>
          <author surname="Gasti" initials="P." fullname="Paolo Gasti"/>
          <author surname="Tsudik" initials="G." fullname="Gene Tsudik"/>
          <author surname="Uzun" initials="E." fullname="Ersin Uzun"/>
          <date year="2102"/>
        </front>
        <seriesInfo name="DOI" value="https://arxiv.org/abs/1112.2205v2"/>
      </reference>
      <reference anchor="Gasti2012" target="https://ieeexplore.ieee.org/document/6614127" quoteTitle="true" derivedAnchor="Gasti2012">
        <front>
          <title>DoS and DDoS in Named Data Networking, in 22nd International Conference on Computer Communication and Networks (ICCCN)</title>
          <author surname="Gasti" initials="P." fullname="Paolo Gasti"/>
          <author surname="Tsudik" initials="G." fullname="Gene Tsudik"/>
          <author surname="Uzun" initials="Ersin" fullname="Ersin Uzun"/>
          <author surname="Zhang" initials="L." fullname="Lixia Zhang"/>
          <date month="August" year="2013"/>
        </front>
        <seriesInfo name="DOI" value="10.1109/ICCCN.2013.6614127"/>
      </reference>
      <reference anchor="Ghali2017" target="https://dl.acm.org/doi/abs/10.1145/3125719.3125723" quoteTitle="true" derivedAnchor="Ghali2017">
        <front>
          <title>When encryption is not enough: privacy attacks in content-centric networking, in ICN '17: Proceedings of the 4th ACM Conference on Information-Centric Networking</title>
          <author surname="Tsudik" initials="G." fullname="Gene Tsudik"/>
          <author surname="Ghali" initials="C." fullname="Cesar Ghali"/>
          <author surname="Wood" initials="C." fullname="Christopher Wood"/>
          <date month="September" year="2017"/>
        </front>
        <seriesInfo name="DOI" value="https://doi.org/10.1145/3125719.3125723"/>
      </reference>
      <reference anchor="Gundogan2018" target="https://dl.acm.org/doi/abs/10.1145/3267955.3269020" quoteTitle="true" derivedAnchor="Gundogan2018">
        <front>
          <title>HoPP: publish-subscribe for the constrained IoT, in ICN '18: Proceedings of the 5th ACM Conference on Information-Centric Networking</title>
          <author surname="Gündoğan" initials="C." fullname="Cenk Gündoğan" asciiFullname="Cenk Gundogan" asciiSurname="Gundogan"/>
          <author surname="Kietzmann" initials="P." fullname="Peter Kietzmann"/>
          <author surname="Schmidt" initials="T." fullname="Thomas Schmidt"/>
          <author surname="Wählisch" initials="M." fullname="Matthias Wählisch" asciiSurname="Wahlisch" asciiFullname="Wahlisch"/>
          <date month="September" year="2018"/>
        </front>
        <seriesInfo name="DOI" value="10.1145/3267955.3269020"/>
      </reference>
      <reference anchor="I-D.irtf-icnrg-flic" target="https://datatracker.ietf.org/doc/html/draft-irtf-icnrg-flic-04" xml:base="https://bib.ietf.org/public/rfc/bibxml-ids/reference.I-D.irtf-icnrg-flic.xml" quoteTitle="true" derivedAnchor="I-D.irtf-icnrg-flic">
        <front>
          <title>File-Like ICN Collections (FLIC)</title>
          <author fullname="Christian Tschudin" initials="C." surname="Tschudin">
            <organization showOnFrontPage="true">University of Basel</organization>
          </author>
          <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
            <organization showOnFrontPage="true">Cloudflare</organization>
          </author>
          <author fullname="Marc Mosko" initials="M." surname="Mosko">
            <organization showOnFrontPage="true">PARC, Inc.</organization>
          </author>
          <author fullname="David R. Oran" initials="D. R." surname="Oran">
            <organization showOnFrontPage="true">Network Systems Research &amp; Design</organization>
          </author>
          <date day="24" month="October" year="2022"/>
          <abstract>
            <t indent="0">This document describes a simple "index table" data structure and its associated Information Centric Networking (ICN) data objects for organizing a set of primitive ICN data objects into a large, File- Like ICN Collection (FLIC). At the core of this collection is a _manifest_ which acts as the collection's root node. The manifest contains an index table with pointers, each pointer being a hash value pointing to either a final data block or another index table node.</t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-irtf-icnrg-flic-04"/>
        <refcontent>Work in Progress</refcontent>
      </reference>
      <reference anchor="I-D.irtf-icnrg-pathsteering" target="https://datatracker.ietf.org/doc/html/draft-irtf-icnrg-pathsteering-04" xml:base="https://bib.ietf.org/public/rfc/bibxml3/reference.I-D.irtf-icnrg-pathsteering.xml" quoteTitle="true" derivedAnchor="I-D.irtf-icnrg-pathsteering">
        <front>
          <title>Path Steering in CCNx and NDN</title>
          <author fullname="Ilya Moiseenko" initials="I." surname="Moiseenko">
            <organization showOnFrontPage="true">Apple, Inc.</organization>
          </author>
          <author fullname="David R. Oran" initials="D. R." surname="Oran">
            <organization showOnFrontPage="true">Network Systems Research and Design</organization>
          </author>
          <date day="2" month="September" year="2023"/>
          <abstract>
            <t indent="0">Path Steering is a mechanism to discover paths to the producers of ICN content objects and steer subsequent Interest messages along a previously discovered path. It has various uses, including the operation of state-of-the-art multipath congestion control algorithms and for network measurement and management. This specification derives directly from the design published in _Path Switching in Content Centric and Named Data Networks_ (4th ACM Conference on Information-Centric Networking - ICN'17) and therefore does not recapitulate the design motivations, implementation details, or evaluation of the scheme. Some technical details are different however, and where there are differences, the design documented here is to be considered definitive. This document is a product of the IRTF Information-Centric Networking Research Group (ICNRG). It is not an IETF product and is not an Internet Standard.</t>
          </abstract>
        </front>
        <seriesInfo name="Internet-Draft" value="draft-irtf-icnrg-pathsteering-04"/>
        <refcontent>Work in Progress</refcontent>
      </reference>
      <reference anchor="Krol2018" target="https://conferences.sigcomm.org/acm-icn/2018/proceedings/icn18-final9.pdf" quoteTitle="true" derivedAnchor="Krol2018">
        <front>
          <title>RICE: Remote Method Invocation in ICN, in Proceedings of the 5th ACM Conference on Information-Centric Networking — ICN '18</title>
          <author surname="Krol" initials="M."/>
          <author surname="Habak" initials="K."/>
          <author surname="Oran" initials="D."/>
          <author surname="Kutscher" initials="D."/>
          <author surname="Psaras" initials="I."/>
          <date year="2018" month="September"/>
        </front>
        <seriesInfo name="DOI" value="10.1145/3267955.3267956"/>
      </reference>
      <reference anchor="Kutscher2022" target="https://dl.acm.org/doi/10.1145/3517212.3558089" quoteTitle="true" derivedAnchor="Kutscher2022">
        <front>
          <title>RESTful information-centric networking: statement, in ICN '22: Proceedings of the 9th ACM Conference on Information-Centric Networking</title>
          <author surname="Kutscher" initials="D."/>
          <author surname="Oran" initials="D."/>
          <date year="2022" month="September"/>
        </front>
        <seriesInfo name="DOI" value="https://doi.org/10.1145/3517212.3558089"/>
      </reference>
      <reference anchor="Lindgren2016" target="https://ieeexplore.ieee.org/abstract/document/7444905" quoteTitle="true" derivedAnchor="Lindgren2016">
        <front>
          <title>Design choices for the IoT in Information-Centric Networks, in 13th IEEE Annual Consumer Communications and Networking Conference (CCNC)</title>
          <author surname="Lindgren" initials="A." fullname="Anders Lindgren"/>
          <author surname="Ben Abdessiem" initials="F." fullname="Fehmi Ben Abdesslem"/>
          <author surname="Ahlgren" initials="B." fullname="Bengt Ahlgren"/>
          <author surname="Schlelén" initials="O." fullname="Olov Schelén" asciiSurname="Schelen" asciiFullname="Olov Schelen"/>
          <author surname="Malik" initials="A.M." fullname="Adeel Mohammad Malik"/>
          <date month="January" year="2016"/>
        </front>
        <seriesInfo name="DOI" value="10.1109/CCNC.2016.7444905"/>
      </reference>
      <reference anchor="Moiseenko2014" target="https://dl.acm.org/doi/10.1145/2660129.2660152" quoteTitle="true" derivedAnchor="Moiseenko2014">
        <front>
          <title>Communication patterns for web interaction in named data networking</title>
          <author surname="Moiseenko" initials="I." fullname="Ilya Moiseenko"/>
          <author surname="Stapp" initials="M." fullname="Mark Stapp"/>
          <author surname="Oran" initials="D." fullname="Dave Oran"/>
          <date month="September" year="2014"/>
        </front>
        <seriesInfo name="DOI" value="10.1145/2660129.2660152"/>
      </reference>
      <reference anchor="Mosko2017" target="https://arxiv.org/abs/1707.04738" quoteTitle="true" derivedAnchor="Mosko2017">
        <front>
          <title>CCNx 1.0 Bidirectional Streams</title>
          <author surname="Mosko" initials="M." fullname="Marc Mosko"/>
          <date month="July" year="2017"/>
        </front>
        <seriesInfo name="arXiv" value="1707.04738"/>
      </reference>
      <reference anchor="NDN" target="https://named-data.net/project/execsummary/" quoteTitle="true" derivedAnchor="NDN">
        <front>
          <title>Named Data Networking</title>
          <author surname="NDN team"/>
          <date year="2020"/>
        </front>
      </reference>
      <reference anchor="NDNTLV" target="http://named-data.net/doc/ndn-tlv/" quoteTitle="true" derivedAnchor="NDNTLV">
        <front>
          <title>NDN Packet Format Specification</title>
          <author surname="NDN Project Team"/>
          <date year="2016"/>
        </front>
      </reference>
      <reference anchor="RFC3261" target="https://www.rfc-editor.org/info/rfc3261" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.3261.xml" quoteTitle="true" derivedAnchor="RFC3261">
        <front>
          <title>SIP: Session Initiation Protocol</title>
          <author fullname="J. Rosenberg" initials="J." surname="Rosenberg"/>
          <author fullname="H. Schulzrinne" initials="H." surname="Schulzrinne"/>
          <author fullname="G. Camarillo" initials="G." surname="Camarillo"/>
          <author fullname="A. Johnston" initials="A." surname="Johnston"/>
          <author fullname="J. Peterson" initials="J." surname="Peterson"/>
          <author fullname="R. Sparks" initials="R." surname="Sparks"/>
          <author fullname="M. Handley" initials="M." surname="Handley"/>
          <author fullname="E. Schooler" initials="E." surname="Schooler"/>
          <date month="June" year="2002"/>
          <abstract>
            <t indent="0">This document describes Session Initiation Protocol (SIP), an application-layer control (signaling) protocol for creating, modifying, and terminating sessions with one or more participants. These sessions include Internet telephone calls, multimedia distribution, and multimedia conferences. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="3261"/>
        <seriesInfo name="DOI" value="10.17487/RFC3261"/>
      </reference>
      <reference anchor="RFC4122" target="https://www.rfc-editor.org/info/rfc4122" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.4122.xml" quoteTitle="true" derivedAnchor="RFC4122">
        <front>
          <title>A Universally Unique IDentifier (UUID) URN Namespace</title>
          <author fullname="P. Leach" initials="P." surname="Leach"/>
          <author fullname="M. Mealling" initials="M." surname="Mealling"/>
          <author fullname="R. Salz" initials="R." surname="Salz"/>
          <date month="July" year="2005"/>
          <abstract>
            <t indent="0">This specification defines a Uniform Resource Name namespace for UUIDs (Universally Unique IDentifier), also known as GUIDs (Globally Unique IDentifier). A UUID is 128 bits long, and can guarantee uniqueness across space and time. UUIDs were originally used in the Apollo Network Computing System and later in the Open Software Foundation\'s (OSF) Distributed Computing Environment (DCE), and then in Microsoft Windows platforms.</t>
            <t indent="0">This specification is derived from the DCE specification with the kind permission of the OSF (now known as The Open Group). Information from earlier versions of the DCE specification have been incorporated into this document. [STANDARDS-TRACK]</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="4122"/>
        <seriesInfo name="DOI" value="10.17487/RFC4122"/>
      </reference>
      <reference anchor="RFC6337" target="https://www.rfc-editor.org/info/rfc6337" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.6337.xml" quoteTitle="true" derivedAnchor="RFC6337">
        <front>
          <title>Session Initiation Protocol (SIP) Usage of the Offer/Answer Model</title>
          <author fullname="S. Okumura" initials="S." surname="Okumura"/>
          <author fullname="T. Sawada" initials="T." surname="Sawada"/>
          <author fullname="P. Kyzivat" initials="P." surname="Kyzivat"/>
          <date month="August" year="2011"/>
          <abstract>
            <t indent="0">The Session Initiation Protocol (SIP) utilizes the offer/answer model to establish and update multimedia sessions using the Session Description Protocol (SDP). The description of the offer/answer model in SIP is dispersed across multiple RFCs. This document summarizes all the current usages of the offer/answer model in SIP communication. This document is not an Internet Standards Track specification; it is published for informational purposes.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="6337"/>
        <seriesInfo name="DOI" value="10.17487/RFC6337"/>
      </reference>
      <reference anchor="RFC7530" target="https://www.rfc-editor.org/info/rfc7530" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.7530.xml" quoteTitle="true" derivedAnchor="RFC7530">
        <front>
          <title>Network File System (NFS) Version 4 Protocol</title>
          <author fullname="T. Haynes" initials="T." role="editor" surname="Haynes"/>
          <author fullname="D. Noveck" initials="D." role="editor" surname="Noveck"/>
          <date month="March" year="2015"/>
          <abstract>
            <t indent="0">The Network File System (NFS) version 4 protocol is a distributed file system protocol that builds on the heritage of NFS protocol version 2 (RFC 1094) and version 3 (RFC 1813). Unlike earlier versions, the NFS version 4 protocol supports traditional file access while integrating support for file locking and the MOUNT protocol. In addition, support for strong security (and its negotiation), COMPOUND operations, client caching, and internationalization has been added. Of course, attention has been applied to making NFS version 4 operate well in an Internet environment.</t>
            <t indent="0">This document, together with the companion External Data Representation (XDR) description document, RFC 7531, obsoletes RFC 3530 as the definition of the NFS version 4 protocol.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="7530"/>
        <seriesInfo name="DOI" value="10.17487/RFC7530"/>
      </reference>
      <reference anchor="RFC8446" target="https://www.rfc-editor.org/info/rfc8446" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8446.xml" quoteTitle="true" derivedAnchor="RFC8446">
        <front>
          <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
          <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
          <date month="August" year="2018"/>
          <abstract>
            <t indent="0">This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
            <t indent="0">This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8446"/>
        <seriesInfo name="DOI" value="10.17487/RFC8446"/>
      </reference>
      <reference anchor="RFC8793" target="https://www.rfc-editor.org/info/rfc8793" xml:base="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.8793.xml" quoteTitle="true" derivedAnchor="RFC8793">
        <front>
          <title>Information-Centric Networking (ICN): Content-Centric Networking (CCNx) and Named Data Networking (NDN) Terminology</title>
          <author fullname="B. Wissingh" initials="B." surname="Wissingh"/>
          <author fullname="C. Wood" initials="C." surname="Wood"/>
          <author fullname="A. Afanasyev" initials="A." surname="Afanasyev"/>
          <author fullname="L. Zhang" initials="L." surname="Zhang"/>
          <author fullname="D. Oran" initials="D." surname="Oran"/>
          <author fullname="C. Tschudin" initials="C." surname="Tschudin"/>
          <date month="June" year="2020"/>
          <abstract>
            <t indent="0">Information-Centric Networking (ICN) is a novel paradigm where network communications are accomplished by requesting named content instead of sending packets to destination addresses. Named Data Networking (NDN) and Content-Centric Networking (CCNx) are two prominent ICN architectures. This document provides an overview of the terminology and definitions that have been used in describing concepts in these two implementations of ICN. While there are other ICN architectures, they are not part of the NDN and CCNx concepts and as such are out of scope for this document. This document is a product of the Information-Centric Networking Research Group (ICNRG).</t>
          </abstract>
        </front>
        <seriesInfo name="RFC" value="8793"/>
        <seriesInfo name="DOI" value="10.17487/RFC8793"/>
      </reference>
      <reference anchor="Shi2020" target="https://dl.acm.org/doi/10.1145/3405656.3418715" quoteTitle="true" derivedAnchor="Shi2020">
        <front>
          <title>NDN-DPDK: NDN Forwarding at 100 Gbps on Commodity Hardware, in Proceedings of the 7th ACM Conference on Information-Centric Networking — ICN '20</title>
          <author surname="Shi" initials="J."/>
          <author surname="Pesavento" initials="D."/>
          <author surname="Benmohamed" initials="L."/>
          <date year="2020" month="September"/>
        </front>
        <seriesInfo name="DOI" value="10.1145/3405656.3418715"/>
      </reference>
      <reference anchor="So2013" target="https://ieeexplore.ieee.org/document/6665203" quoteTitle="true" derivedAnchor="So2013">
        <front>
          <title>Named data networking on a router: Fast and DoS-resistant forwarding with hash tables, in proceedings of Architectures for Networking and Communications Systems</title>
          <author surname="So" initials="W." fullname="Won So"/>
          <author surname="Narayanan" initials="A." fullname="Ashok Narayanan"/>
          <author surname="Oran" initials="D." fullname="David Oran"/>
          <date year="2013" month="October"/>
        </front>
        <seriesInfo name="DOI" value="10.1109/ANCS.2013.6665203"/>
      </reference>
      <reference anchor="Zhang2018" target="https://conferences.sigcomm.org/acm-icn/2018/proceedings/icn18-final23.pdf" quoteTitle="true" derivedAnchor="Zhang2018">
        <front>
          <title>KITE: Producer Mobility Support in Named Data Networking, in Proceedings of the 5th ACM Conference on Information-Centric Networking — ICN '18</title>
          <author surname="Zhang" initials="Y" fullname="Yu Zhang"/>
          <author surname="Xia" initials="Z." fullname="Zhongda Xia"/>
          <author surname="Mastorakis" initials="S." fullname="Spyridon Mastorakis"/>
          <author surname="Zhang" initials="L" fullname="Lixia Zhang"/>
          <date year="2018" month="September"/>
        </front>
        <seriesInfo name="DOI" value="10.1145/3267955.3267959"/>
      </reference>
    </references>
    <section anchor="rejected-alternatives" numbered="true" removeInRFC="false" toc="include" pn="section-appendix.a">
      <name slugifiedName="name-alternative-designs-conside">Alternative Designs Considered</name>
      <t indent="0" pn="section-appendix.a-1">During development of this specification, a number of alternative designs were considered and at least partially documented. This appendix explains them for historical purposes, and explains why these were considered inferior to the design we settled on to carry forward.</t>
      <section anchor="fib-based-design" numbered="true" removeInRFC="false" toc="include" pn="section-appendix.a.1">
        <name slugifiedName="name-handling-reflexive-interest">Handling reflexive interests using dynamic FIB entries</name>
        <t anchor="FIB-requirements" indent="0" pn="section-appendix.a.1-1">
	    The original draft specification employed the use of dynamically-created FIB entries for forwarding Reflexive Interests. In this approach,
	    at each forwarder along the inverse path from producer to
	    consumer, a FIB entry must be present that matches this
	    name via Longest Name Prefix Match (LNPM), so that when the reflexive interest
	    arrives, the forwarder can forward it downstream toward
	    the originating consumer. This FIB entry would point directly
	    to the incoming interface on which the corresponding
	    original Interest arrived. The FIB entry needs to be
	    created as part of the forwarding of the original Interest
	    so that it is available in time to catch any reflexive
	    Interest issued by the producer. It would usually make sense to
	    destroy this FIB entry when the Data message satisfying
	    the original Interest arrives since this avoids any
	    dangling stale state. Given the design details discussed
	    below, stale FIB state would not
	    represent a correctness hazard and hence could be done
	    lazily if desired in an implementation. </t>
        <t indent="0" pn="section-appendix.a.1-2">In this scheme, the forwarder operates as follows:</t>
        <ol indent="adaptive" spacing="normal" start="1" type="1" pn="section-appendix.a.1-3">
			<li pn="section-appendix.a.1-3.1" derivedCounter="1.">The forwarder creates short-lifetime FIB entries for any
	  Reflexive Interest Name prefixes communicated in an Interest
	  message. If the forwarder does not have sufficient resources
	  to do so, it rejects the Interest with the T_RETURN_NO_RESOURCES error — the same error used if the
	  forwarder were lacking sufficient PIT resources to process the Interest message.</li>
          <li pn="section-appendix.a.1-3.2" derivedCounter="2.">Those FIB entries are queried whenever an Interest
	  message arrives whose first name segment is of the type
	  <em>Reflexive Interest Name Segment (RNP)</em></li>
          <li pn="section-appendix.a.1-3.3" derivedCounter="3.">The FIB entry gets removed eventually, after the
	  corresponding Data message has been forwarded. One option
	  would be to remove the FIB directly after the Data message
	  has been forwarded. However, the forwarder might choose do lazy
	  cleanup.</li>
        </ol>
        <t indent="0" pn="section-appendix.a.1-4">There are a number of additional considerations with this design that need to be dealt with.</t>
        <section anchor="FIB" numbered="true" removeInRFC="false" toc="include" pn="section-appendix.a.1.1">
          <name slugifiedName="name-design-complexities-and-per">Design complexities and performance issues with FIB-based design</name>
          <t indent="0" pn="section-appendix.a.1.1-1">When processing an Interest containing the reflexive name TLV and creating the necessary FIB entry, the forwarder also creates a <em>back pointer</em> from that FIB entry to the PIT entry for the Interest message that created it. This PIT entry contains the current value of the remaining Interest lifetime or alternatively a value from which the remaining Interest lifetime can be easily computed. Call this value <em>IL<sub>t</sub></em>.</t>
          <t indent="0" pn="section-appendix.a.1.1-2">The forwarder input thread could key off the high-order name segment type (one byte) and if reflexive,  do a reflexive FIB lookup instead of a full name hash. The reflexive FIB entry would contain the shard identity of the matching Interest (concretely, the core id servicing the shard) and steer the reflexive interest there. The reflexive name prefix FIB lookup would have to be competitive performance-wise with a full-name hash for this to win, however. Experimentation is needed to further evaluate such implementation tradeoffs for input packet load balancing in high-speed forwarders.</t>
          <t indent="0" pn="section-appendix.a.1.1-3">The FIB is a performance-critical data structure in any forwarder, as it needs to support relatively expensive longest name prefix match (LNPM) lookup algorithms. A number of well-known FIB data structures are heavily optimized for read access, since for normal Interest message processing the FIB changes slowly — only after topological changes or routing protocol updates. Support for reflexive names using dynamic FIB entries changes this, as FIB entries would be created and destroyed rapidly as Interest messages containing reflexive name TLVs are processed and the corresponding Data messages come back.</t>
          <t indent="0" pn="section-appendix.a.1.1-4">While it may be feasible, especially in low-end forwarders handling a low packet forwarding rate to ignore this problem, for high-speed forwarders there are a number of hazards, including:</t>
          <ol indent="adaptive" spacing="normal" start="1" type="1" pn="section-appendix.a.1.1-5">
      			<li pn="section-appendix.a.1.1-5.1" derivedCounter="1.">If the entire FIB needs to be locked in order to insert or remove entries, this could cause inflated forwarding delays or in extreme cases, forwarding performance collapse.</li>
            <li pn="section-appendix.a.1.1-5.2" derivedCounter="2.">A number of high-speed forwarder implementations employ a sharded PIT scheme (see <xref target="PIT-sharding" format="default" sectionFormat="of" derivedContent="Section 6.1.1"/>) to better parallelize forwarding across processing cores. The FIB, however, is still a shared data structure which is either read without read locks across cores, or explicitly copied such that there is a separate copy of the FIB for each PIT shard. Clearly, a high update rate without read locks and/or updating many copies of the FIB are unattractive implementation options. (Note: unlike the adopted scheme in the main specification, by just depending on a dynamic FIB it is not feasible to force reflexive interests to be hashed or be otherwise directed to the PIT shard holding the original Interest state).</li>
          </ol>
          <t indent="0" pn="section-appendix.a.1.1-6">There are any number of alternative FIB implementations that can work adequately. The most straightforward would be to simply implement a "special" FIB for just reflexive name lookups. This is feasible because reflexive names deterministically contain the distinguished high-order name segment type of T_REFLEXIVE_NAME, whose content is a 64-bit value that can be easily hashed to a FIB entry directly, avoiding the more expensive LNPM lookup. Inserts and deletes then devolve to the well-understood problem of hash table maintenance.</t>
        </section>
        <section anchor="FIB-and-interest-lifetime" numbered="true" removeInRFC="false" toc="include" pn="section-appendix.a.1.2">
          <name slugifiedName="name-interactions-between-fib-ba">Interactions between FIB-based design and Interest Lifetime</name>
          <t indent="0" pn="section-appendix.a.1.2-1">If Interest lifetime handling is implemented naively, it may run afoul of a sharded PIT forwarder implementation, since the PIT entry for the reflexive Interest and the PIT entry for the original Interest may be in different shards. Therefore, if the update is done cross-shard on each reflexive Interest arrival, performance may suffer, perhaps dramatically. Instead, the following approach to updating the Interest lifetime after computing the new value is would be needed by this FIB-based design for sharded-PIT forwarders.</t>
          <t indent="0" pn="section-appendix.a.1.2-2">When creating the  reflexive FIB entry as above in <xref target="FIB" format="default" sectionFormat="of" derivedContent="Appendix A.1.1"/>, copy the remaining Interest lifetime from the PIT entry. Do the PIT update if and only if this value is about to expire, thus paying the cross-shard update cost only if the original Interest is about to expire. A further optimization at the cost of modest extra complexity is to instead <em>queue</em> the update to the core holding the shard of the original PIT entry rather than doing the update directly. If the PIT entry expires or is satisfied, instead of removing it the associated core checks the update queue and does the necessary update.</t>
        </section>
      </section>
      <section anchor="path-steering-based-design" numbered="true" removeInRFC="false" toc="include" pn="section-appendix.a.2">
        <name slugifiedName="name-reflexive-forwarding-using-">Reflexive forwarding using Path Steering</name>
        <t indent="0" pn="section-appendix.a.2-1">We also considered leveraging Path Steering <xref target="I-D.irtf-icnrg-pathsteering" format="default" sectionFormat="of" derivedContent="I-D.irtf-icnrg-pathsteering"/> Path
	    Labels that inform the forwarder at each hop which
	    outgoing face to use for for forwarding the Reflexive
	    Interest. In this approach, the producer, when creating and issuing the
	    Reflexive Interest with the Reflexive Name Prefix includes
	     a Path Label to strictly steer the forwarding at all
	    hops from the producer to the consumer (strict mode Path
	    Steering). This means, the Reflexive Interest carries the
	    Reflexive Name Prefix, but forwarders do not apply LNPM or
	    any other outgoing face selection based on the
	    name. It also eliminates the need for dynamic FIB entries as discussed above in <xref target="fib-based-design" format="default" sectionFormat="of" derivedContent="Appendix A.1"/>.
	    Instead the forwarding is strictly steered by the Path Label using regular Path Steering semantics.</t>
        <t indent="0" pn="section-appendix.a.2-2">The message flow using Path Steering would look like the following:</t>
        <figure anchor="path-steering-message-flow" align="left" suppress-title="false" pn="figure-8">
          <name slugifiedName="name-message-flow-overview-using">Message Flow Overview using Path Steering</name>
          <artwork type="ascii-art" align="left" pn="section-appendix.a.2-3.1" originalSrc="rf-path-steering.txt">+-----------+                        +-----------+               +-----------+
| Consumer  |                        | Forwarder |               | Producer  |
+-----------+                        +-----------+               +-----------+
      | -----------------------------\     |                           |
      |-| Create I1 with additional, |     |                           |
      | | emptyPath Label            |     |                           |
      | | data structure             |     |                           |
      | | for reverse discovery      |     |                           |
      | |----------------------------|     |                           |
      |                                    |                           |
      | I1 with Path Label                 |                           |
      | and RNP TLV                        |                           |
      |-----------------------------------&gt;|                           |
      |                                    | -----------------\        |
      |                                    |-| Add path label |        |
      |                                    | | for adjacency  |        |
      |                                    | | to Consumer    |        |
      |                                    | |----------------|        |
      |                                    |                           |
      |                                    | I1                        |
      |                                    |--------------------------&gt;|
      |                                    |       ------------------\ |
      |                                    |       | Create RI state |-|
      |                                    |       |-----------------| |
      |                                    |                           |
      |                                    |               RI with RNP |
      |                                    |            and path label |
      |                                    |             (strict mode) |
      |                                    |&lt;--------------------------|
      |        --------------------------\ |                           |
      |        | perform path label      |-|                           |
      |        | switching (no FIB info) | |                           |
      |        |-------------------------| |                           |
      |                                    |                           |
      |                        RI with RNP |                           |
      |&lt;-----------------------------------|                           |
      |                                    |                           |
      | D2 (RNP)                           |                           |
      |-----------------------------------&gt;|                           |
      |                                    | --------------------\     |
      |                                    |-| regular PIT-based |     |
      |                                    | | forwarding        |     |
      |                                    | |-------------------|     |
      |                                    |                           |
      |                                    | D2 (RNP)                  |
      |                                    |--------------------------&gt;|
      |                                    |        -----------------\ |
      |                                    |        | all parameters |-|
      |                                    |        | received,      | |
      |                                    |        | answer orig.   | |
      |                                    |        | I1 Interest    | |
      |                                    |        |----------------| |
      |                                    |                           |
      |                                    |                        D1 |
      |                                    |&lt;--------------------------|
      |              --------------------\ |                           |
      |              | regular PIT-based |-|                           |
      |              | forwarding        | |                           |
      |              |-------------------| |                           |
      |                                    |                           |
      |                                 D1 |                           |
      |&lt;-----------------------------------|                           |
      |                                    |                           |
</artwork>
          <artwork type="ascii-art" align="left" pn="section-appendix.a.2-3.2">
    Legend:
    I1: Interest #1 containing the Reflexive Name Prefix TLV
    RI: Reflexive Interest with Reflexive Name Prefix Segment
    RNP: Reflexive Name Prefix
    D1: Data message, answering initiating I1 Interest
    D2: Data message, answering RI
</artwork>
        </figure>
        <t indent="0" pn="section-appendix.a.2-4">
	Path Steering uses Path Label data structures on the
	downstream path (from producer to consumer) to discover and
	collect hop-by-hop forwarding information so that consumers
	can then specify selected paths for subsequent
	Interests. Reflexive Forwarding would use the
	same data structure, but for "reverse discovery", i.e., in the
	upstream direction from consumer to producer.
        </t>
        <t indent="0" pn="section-appendix.a.2-5"> From an operational perspective the path-steering approach does not exhibit good properties with respect to backward compatibility. Without a complete path of forwarders between consumer and producer that support path steering, reflexive interests cannot reach the intended consumer. While we might envision a way to	steer a subsequent Interest onto a working path as proposed in <xref target="I-D.irtf-icnrg-pathsteering" format="default" sectionFormat="of" derivedContent="I-D.irtf-icnrg-pathsteering"/>, there is no
	capability to force Interest routing away from an otherwise	working path not supporting the reflexive name TLV.</t>
      </section>
    </section>
    <section numbered="true" removeInRFC="false" toc="include" pn="section-appendix.b">
      <name slugifiedName="name-implementations">Implementations</name>
      <t indent="0" pn="section-appendix.b-1">
   An implementation of Reflexive Forwarind in NDN is available at
   https://github.com/nflsjxc/Reflexive-Forwarding-NDN-demo/tree/master. It
   differs from this specification in the following ways:
      </t>
      <section numbered="true" removeInRFC="false" toc="include" pn="section-appendix.b.1">
        <name slugifiedName="name-reflexive-name-segment">Reflexive Name Segment</name>
        <t indent="0" pn="section-appendix.b.1-1">
   Currently Reflexive Name Component is the suffix instead of the
   prefix for the Reflexive Names. This is easier for prefix matching
   in NFD.
        </t>
      </section>
      <section numbered="true" removeInRFC="false" toc="include" pn="section-appendix.b.2">
        <name slugifiedName="name-processing-reflexive-intere">Processing Reflexive Interests&gt;</name>
        <t indent="0" pn="section-appendix.b.2-1">
   Currently we omit the RNP checking of Reflexive Interest with RNP
   in PIT entry because NFD now uses name-based PITs.
        </t>
        <t indent="0" pn="section-appendix.b.2-2">
   Generally speaking there are 2 types of interests in the message flow:
        </t>
        <ol indent="adaptive" spacing="normal" start="1" type="1" pn="section-appendix.b.2-3">
     <li pn="section-appendix.b.2-3.1" derivedCounter="1.">Reflexive Interest (Consumer -&gt; Producer)</li>
          <li pn="section-appendix.b.2-3.2" derivedCounter="2.">Reflexive Interest (Producer -&gt; Consumer)</li>
        </ol>
        <t indent="0" pn="section-appendix.b.2-4">
     Currently the two types of Interests are identified by the
     Reflexive Name value, if RN=9999, then it is the Reflexive Interest
     from Producer to Consumer.
        </t>
      </section>
    </section>
    <!-- Change Log
	   v00 2020-03-15  DRO/DK Initial version
	   v02 2022-02-16  Major re-work to switch to PIT tokens
	   v03 2022-06-04  Changes to address Ken Calvert comments
	   v04 2022-11-28  Keepalive + chage Dirk's affiliation
	   v05 2023-03-15  QAddress Hitoshi Asaeda's comments
      -->
 <section anchor="authors-addresses" numbered="false" removeInRFC="false" toc="include" pn="section-appendix.c">
      <name slugifiedName="name-authors-addresses">Authors' Addresses</name>
      <author fullname="Dave Oran" initials="D." surname="Oran">
        <organization showOnFrontPage="true">Network Systems Research and Design</organization>
        <address>
          <postal>
            <street>4 Shady Hill Square</street>
            <!-- Reorder these if your country does things differently -->
          <city>Cambridge</city>
            <region>MA</region>
            <code>02138</code>
            <country>USA</country>
          </postal>
          <phone/>
          <email>daveoran@orandom.net</email>
          <!-- uri and facsimile elements may also be added -->
      </address>
      </author>
      <author fullname="Dirk Kutscher" initials="D." surname="Kutscher">
        <organization showOnFrontPage="true">HKUST(GZ)</organization>
        <address>
          <postal>
            <!--          <street>Nansha</street> -->
          <!-- Reorder these if your country does things differently -->
<!--          <code>26723</code> -->
          <city>Guangzhou</city>
            <country>China</country>
          </postal>
          <phone/>
          <email>ietf@dkutscher.net</email>
          <uri>https://dirk-kutscher.info</uri>
        </address>
      </author>
    </section>
  </back>
</rfc>
