Match!

An exploration of cache collaboration in information-centric network

Published on Sep 1, 2014in International Journal of Communication Systems1.278
· DOI :10.1002/dac.2773
Bohao Feng6
Estimated H-index: 6
(Beijing Jiaotong University),
Zhou Huachun16
Estimated H-index: 16
(Beijing Jiaotong University)
+ 1 AuthorsIlsun You1
Estimated H-index: 1
Sources
Abstract
As one of key differences from traditional Internet, information-centric networking introduces the network built-in cache in network nodes. It is not proper to analyze a cache node isolated from cache neighbors, especially for the named data network in which all network nodes can cache the content. In this paper, we try to look insight into such an issue and propose a way of cache collaboration not only for the on-path but also for the off-path routers. The autonomous cache is not efficient and cache routers are required to guarantee the time of the cached content for the stability as well as the reliability. Therefore, we firstly introduce an interest counter, on one hand, to rank different contents within a period, in this way, we can use the advantage of the least frequently used LFU as well as avoid its cache pollution problem, on the other hand, to reduce the rate of content replacement and to maintain a relative stability in forwarding plane, thus, the cached content can be easily managed by the control plane. Secondly, we utilize the interest-prune and the steady content advertisement mechanism in the control plane based on the interest counter in order to eliminate the duplicated cached content along en-route routers and cache neighbors, as a result, more cache capacity for different contents can be saved and efficient cache collaboration can be obtained. We evaluate the performance of our scheme in line, tree and grid topology scenarios. The simulation results show that our scheme performs well compared with the perfect-LFU, the LFU, the random, and least recently used replacement policies. Copyright © 2014 John Wiley & Sons, Ltd.
  • References (36)
  • Citations (7)
📖 Papers frequently viewed together
2018
1 Citations
2017
3 Authors (Yusaku Hayamizu, ..., Miki Yamamoto)
1 Citations
78% of Scinapse members use related papers. After signing in, all features are FREE.
References36
Newest
#1Kai Wang (Beijing Jiaotong University)H-Index: 5
#2Jia Chen (Beijing Jiaotong University)H-Index: 4
Last. Hongke Zhang (Beijing Jiaotong University)H-Index: 25
view all 5 authors...
Named data networking NDN has attracted much attention on the design for next generation Internet architecture. Although it embeds some security primitives in its original architecture, it may suffer from denial-of-service DoS attacks. In this paper, we model one representative type of NDN-specific DoS attacks named DoS against pending interest table PIT, or DoS-PIT, which floods malicious Interests that request nonexistent content to bypass cached content at routers and to exhaust the memory re...
17 CitationsSource
Sep 29, 2014 in ICCCN (International Conference on Computer Communications and Networks)
#1Zhongxing Ming (THU: Tsinghua University)H-Index: 4
#2Mingwei Xu (THU: Tsinghua University)H-Index: 15
Last. Dayong Wang (PolyU: Hong Kong Polytechnic University)H-Index: 86
view all 3 authors...
45 CitationsSource
#1Jia Chen (Beijing Jiaotong University)H-Index: 4
#2Hongke Zhang (Beijing Jiaotong University)H-Index: 25
Last. Hongbin Luo (Beijing Jiaotong University)H-Index: 13
view all 4 authors...
In this paper, we investigate the optimization of content router deployment in large-scale information centric core-edge separation Internet. We formulate the target cost function, which captures the trade-off between the cost for traffic transmission and cost due to additional deployment of content routers. To solve the problem, we first derive the analytical results of traffic ratio and its closed-form approximation. We then construct a convex optimization problem, from which the optimal deplo...
9 CitationsSource
#1George Xylomenos (OPA: Athens University of Economics and Business)H-Index: 20
#2Christopher N. Ververidis (OPA: Athens University of Economics and Business)H-Index: 10
Last. George C. Polyzos (OPA: Athens University of Economics and Business)H-Index: 38
view all 8 authors...
The current Internet architecture was founded upon a host-centric communication model, which was appropriate for coping with the needs of the early Internet users. Internet usage has evolved however, with most users mainly interested in accessing (vast amounts of) information, irrespective of its physical location. This paradigm shift in the usage model of the Internet, along with the pressing needs for, among others, better security and mobility support, has led researchers into considering a r...
855 CitationsSource
The insider threat faced by corporations and governments today is a real and significant problem, and one that has become increasingly difficult to combat as the years have progressed. From a technology standpoint, traditional protective measures such as intrusion detection systems are largely inadequate given the nature of the ‘insider’ and their legitimate access to prized organisational data and assets. As a result, it is necessary to research and develop more sophisticated approaches for the...
42 CitationsSource
#1Giovanna Carofiglio (Bell Labs)H-Index: 18
#2Massimo Gallo (Bell Labs)H-Index: 15
Last. Luca Muscariello (Orange S.A.)H-Index: 23
view all 3 authors...
Information Centric Network (ICN) proposals, have recently emerged to define new network architectures where content, and not its location, becomes the core of the communication model. Such new paradigms push data storage and delivery at network layer and are designed to cope with current Internet usage, mainly centered around content dissemination and retrieval.In this paper, we develop an analytical model of ICN storage and bandwidth sharing under fairly general assumptions on total demand, to...
30 CitationsSource
#1George Pavlou (UCL: University College London)H-Index: 37
#2Ning Wang (University of Surrey)H-Index: 23
Last. Ioannis Psaras (UCL: University College London)H-Index: 20
view all 4 authors...
Given that the vast majority of Internet interactions relate to content access and delivery, recent research has pointed to a potential paradigm shift from the current host-centric Internet model to an information-centric one. In information-centric networks, named content is accessed directly, with the best content copy delivered to the requesting user given content caching within the network. Here, we present an Internet-scale mediation approach for content access and delivery that supports co...
19 CitationsSource
#1Wei Koong Chai (UCL: University College London)H-Index: 12
#2Diliang He (UCL: University College London)H-Index: 2
Last. George Pavlou (UCL: University College London)H-Index: 37
view all 4 authors...
Ubiquitous in-network caching is one of the key aspects of information-centric networking (ICN) which has received widespread research interest in recent years. In one of the key relevant proposals known as Content-Centric Networking (CCN), the premise is that leveraging in-network caching to store content in every node along the delivery path can enhance content delivery. We question such an indiscriminate universal caching strategy and investigate whether caching less can actually achieve more...
145 CitationsSource
#1Marek DabrowskiH-Index: 2
#2Justyna Gromada (Intel)H-Index: 2
Last. Jacky ForestierH-Index: 2
view all 4 authors...
TV and video services landscape is currently undergoing significant changes. Traditional TV broadcasting model is supplemented and often even replaced by digital content distribution services over the Internet. As a result of this trend, a range of services and contents available for users is rapidly expanding. As a side-effect, designing efficient user interfaces for discovering the content, as well as for manipulating associated interactive services, becomes more and more cumbersome. Pervasive...
10 Citations
#1Liang SunH-Index: 2
#2Fei SongH-Index: 10
Last. Yajuan Qin (Beijing Jiaotong University)H-Index: 10
view all 4 authors...
The goal of Content Centric Network (CCN) is to provide high-efficient mechanism to store the content which is widely stored at the network center and edge. Content name, rather than IP, is used for data transmission in CCN. It is necessary to identify content, and keep the mapping relation between content and network interfaces. With the data exponential growth, scalability in CCN will be more serious than TCP/IP. In this paper we present a Distributed Hierarchical Rrouting for Content Centric ...
16 Citations
Cited By7
Newest
Source
#1Dong Doan Van (Ho Chi Minh City University of Transport)H-Index: 1
#2Qingsong Ai (WUT: Wuhan University of Technology)H-Index: 1
5 CitationsSource
#1Wai-Xi LiuH-Index: 1
#2Jin LiH-Index: 43
Last. Shun-Zheng Yu (SYSU: Sun Yat-sen University)H-Index: 10
view all 6 authors...
By overcoming the well-known challenges of the current internet, great expectations are focused on information-centric networking (ICN). ICN extensively uses universal in-network caching. However, developing an efficient caching scheme remains an open question. To overcome the useless caching and duplication caching of previous caching schemes, we propose an adaptive caching scheme—caching on demand (COD). By following the change in potential demand from the consumer and the temporal patterns of...
Source
#1Muhammad Faran Majeed (AIT: Asian Institute of Technology)H-Index: 3
#2Matthew N. Dailey (AIT: Asian Institute of Technology)H-Index: 23
Last. Apinun Tunpan (AIT: Asian Institute of Technology)H-Index: 5
view all 4 authors...
Information-centric networking (ICN) is a future Internet architecture with the potential to solve myriad issues arising from traditional Internet architecture. By providing in-network caching of content, ICN provides for efficient delivery of content, such as streaming video, that occupies most of the bandwidth and resources of the Internet. Named data network (NDN) is a promising ICN architecture that supports video streaming (both live and on-demand) but does not fully exploit the full potent...
7 CitationsSource
#1Jun Li (Zhejiang Wanli University)H-Index: 1
#2Hao Wu (THU: Tsinghua University)H-Index: 9
Last. Jiong Shi (Zhejiang Wanli University)H-Index: 4
view all 6 authors...
With the increasing demand of content dissemination, Content-Centric Networking (CCN) has been proposed as a promising architecture for future Internet. In response to the challenges in CCN caching, we develop an online caching scheme (named RBC-CC) exploiting the concept of Routing Betweenness Centrality (RBC) and "prefetching", aiming at significantly reducing costly inter-ISP traffic and largely reducing content access hops. Simulation results demonstrate that the proposed caching scheme can ...
1 CitationsSource
#1Matteo Virgilio (Polytechnic University of Turin)H-Index: 4
#2Guido Marchetto (Polytechnic University of Turin)H-Index: 10
Last. Riccardo Sisto (Polytechnic University of Turin)H-Index: 18
view all 3 authors...
Summary Content-Centric Networking (CCN) represents an established candidate for the future Internet, proposing a routing architecture designed to elevate content to first class entity. Starting from the fact that the network usage has dramatically evolved towards content retrieval, CCN relies on an on-demand pull based mechanism to transfer data from the different sources to the heterogeneous consumers. This paradigm enhances the network in a number of ways, ranging from the newly introduced in...
18 CitationsSource
#1Zhikui Chen (DUT: Dalian University of Technology)H-Index: 19
#2Laurence T. Yang (St. Francis Xavier University)H-Index: 44
Last. Geyong Min (University of Exeter)H-Index: 33
view all 3 authors...
1 CitationsSource