Notes Onur Ascigil, Vasilis Sourlas, Ioannis Psaras, and George Pavlou

Slides:



Advertisements
Similar presentations
COPYRIGHT © 2011 ALCATEL-LUCENT. ALL RIGHTS RESERVED. INFORM: a dynamic INterest FORwarding Mechanism for Information Centric Networking Raffaele Chiocchetti,
Advertisements

Internetworking II: MPLS, Security, and Traffic Engineering
Authors: Alexander Afanasyev, Priya Mahadevany, Ilya Moiseenko, Ersin Uzuny, Lixia Zhang Publisher: IFIP Networking, 2013 (International Federation for.
Rumor Routing in Sensor Networks David Braginsky and Deborah Estrin Presented By Tu Tran 1.
Small-world Overlay P2P Network
Named Data Networking for Social Network Content delivery P. Truong, B. Mathieu (Orange Labs), K. Satzke (Alu) E. Stephan (Orange Labs) draft-truong-icnrg-ndn-osn-00.txt.
Beneficial Caching in Mobile Ad Hoc Networks Bin Tang, Samir Das, Himanshu Gupta Computer Science Department Stony Brook University.
Peer-to-Peer Based Multimedia Distribution Service Zhe Xiang, Qian Zhang, Wenwu Zhu, Zhensheng Zhang IEEE Transactions on Multimedia, Vol. 6, No. 2, April.
Kyushu University Graduate School of Information Science and Electrical Engineering Department of Advanced Information Technology Supervisor: Professor.
Freenet A Distributed Anonymous Information Storage and Retrieval System I Clarke O Sandberg I Clarke O Sandberg B WileyT W Hong.
1 Hierarchical Distance-Vector Multicast Routing for MBone Presented by Nitin Deshpande Darpan Bhuva.
Forwarding Hint in NFD Junxiao Shi,
1 Internet Protocol: Forwarding IP Datagrams Chapter 7.
Adaptive flow control via Interest Aggregation in CCN by Dojun Byun, Byoung-joon, Myeong-Wuk Jang Samsung Electronics, Advanced Institute of Technology.
Network Layer introduction 4.2 virtual circuit and datagram networks 4.3 what’s inside a router 4.4 IP: Internet Protocol  datagram format  IPv4.
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking BGP, Flooding, Multicast routing.
1 IP Forwarding Relates to Lab 3. Covers the principles of end-to-end datagram delivery in IP networks.
Aadil Zia Khan and Shahab Baqai LUMS School of Science and Engineering QoS Aware Path Selection in Content Centric Networks Fahad R. Dogar Carnegie Mellon.
IEEE Globecom 2010 Tan Le Yong Liu Department of Electrical and Computer Engineering Polytechnic Institute of NYU Opportunistic Overlay Multicast in Wireless.
Martin-1 CSE 5810 CSE 5810 Individual Research Project: Integration of Named Data Networking for Improved Healthcare Data Handling Robert Martin Computer.
A NAMED DATA NETWORKING FLEXIBLE FRAMEWORK FOR MANAGEMENT COMMUNICATION Authors: Daneil Corjuo and Rui L. Aguiar Ivan Vidal and Jamie Garcia-Reinoso Presented.
TOMA: A Viable Solution for Large- Scale Multicast Service Support Li Lao, Jun-Hong Cui, and Mario Gerla UCLA and University of Connecticut Networking.
Review of the literature : DMND:Collecting Data from Mobiles Using Named Data Takashima Daiki Park Lab, Waseda University, Japan 1/15.
 SNU INC Lab MOBICOM 2002 Directed Diffusion for Wireless Sensor Networking C. Intanagonwiwat, R. Govindan, D. Estrin, John Heidemann, and Fabio Silva.
Page  1 Content Centric Network: Caching WANG Yu KATTO Lab. Dec
Othman Othman M.M., Koji Okamura Kyushu University 1.
Bob Knowledge Plane -- Scaling of the WHY App Bob Braden, ISI 24 Sept 03.
Routing Policies in Named Data Networking Steve DiBenedetto Christos Papadopoulos Dan Massey.
Optimal Content Delivery with Network Coding Derek Leong, Tracey Ho California Institute of Technology Rebecca Cathey BAE Systems CISS 2009 March 19, 2009.
Adaptive Web Caching CS411 Dynamic Web-Based Systems Flying Pig Fei Teng/Long Zhao/Pallavi Shinde Computer Science Department.
《 Hierarchical Caching Management for Software Defined Content Network based on Node Value 》 Reporter : Jing Liu , China Affiliation : University of Science.
GPSR: Greedy Perimeter Stateless Routing for Wireless Networks EECS 600 Advanced Network Research, Spring 2005 Shudong Jin February 14, 2005.
Rendezvous Regions: A Scalable Architecture for Service Location and Data-Centric Storage in Large-Scale Wireless Sensor Networks Karim Seada, Ahmed Helmy.
Internet Protocol: Routing IP Datagrams Chapter 8.
Deadline-based Resource Management for Information- Centric Networks Somaya Arianfar, Pasi Sarolahti, Jörg Ott Aalto University, Department of Communications.
ECE 544 Project3 Group 9 Brien Range Sidhika Varshney Sanhitha Rao Puskuru.
Spring 2000CS 4611 Routing Outline Algorithms Scalability.
7/11/0666th IETF1 QoS Enhancements to BGP in Support of Multiple Classes of Service Andreas Terzis Computer Science Department Johns Hopkins University.
Improving Fault Tolerance in AODV Matthew J. Miller Jungmin So.
Incrementally Improving Lookup Latency in Distributed Hash Table Systems Hui Zhang 1, Ashish Goel 2, Ramesh Govindan 1 1 University of Southern California.
COMP8330/7330/7336 Advanced Parallel and Distributed Computing Communication Costs in Parallel Machines Dr. Xiao Qin Auburn University
Cooperative Caching in Wireless P2P Networks: Design, Implementation And Evaluation.
Advanced Computer Networks
Auction-based in-network caching in Information-centric networks Workshop ACROSS, 16th of September 2016 | Lucia D’Acunto.
Content Centric Networking
Pastry Scalable, decentralized object locations and routing for large p2p systems.
802.11s Proposal - Joint SEE-Mesh/Wi-Mesh Proposal to TGs
July 3, 2015 MuSIC (co-located with ICME) 2015, Torino, Italy
Introduction to Wireless Sensor Networks
Revisiting Ethernet: Plug-and-play made scalable and efficient
The Impact of Replacement Granularity on Video Caching
A Study of Group-Tree Matching in Large Scale Group Communications
Forwarding and Routing IP Packets
Routing/Routed Protocols
ECE 544 Protocol Design Project 2016
nTorrent: Peer-to-Peer File Sharing in Named Data Networking
Improving the Freshness of NDN Forwarding States
Fuzzy Interest Forwarding
Statistical Optimal Hash-based Longest Prefix Match
A Probabilistic Routing Protocol for Mobile Ad Hoc Networks
Name-based Packet Forwarding
INFOCOM 2013 – Torino, Italy Content-centric wireless networks with limited buffers: when mobility hurts Giusi Alfano, Politecnico di Torino, Italy Michele.
Junaid Ahmed Khan, Cedric Westphal, J. J
ECE 544 Project3 Team member: BIAO LI, BO QU, XIAO ZHANG 1 1.
Dynamic Routing and OSPF
Viet Nguyen Jianqing Liu Yaqin Tang
A Probabilistic Routing Protocol for Mobile Ad Hoc Networks
Storing and Replication in Topic-Based Pub/Sub Networks
Achieving Resilient Routing in the Internet
SANDIE: Optimizing NDN for Data Intensive Science
Presentation transcript:

Opportunistic Off-Path Content Discovery in Information-Centric Networks Notes Onur Ascigil, Vasilis Sourlas, Ioannis Psaras, and George Pavlou Department of Electronic and Electrical Engineering, University College London, UK

Outline Content discovery in Information-centric Networks (ICN) Opportunistic Content Discovery Evaluation Future Work & Conclusions

Content Discovery in ICN

Content Discovery in ICN: ICN Features Information-centric Networking (ICN) features Naming of content e.g., /ucl/ee/onur/lanman_presentation2016.ppt Network Storage Ubiquitous caching Stateful Forwarding Request (i.e, Interest) leaves breadcrumbs, which the data follows Routing on names: Mostly focused on locating the content on-path, at origin or a designated cache Disclaimer: ignoring scalability issues in this talk Goal: integrate content delivery as a native network feature Is it achieved? Content can be transparently delivered from any cache enabled node or router. Routing and forwarding are based on content names.

Content Discovery in ICN Find a nearby (ideally nearest!) copy of the content Difficult to achieve without significant ``overhead’’ in practice Why? Volatile nature of content in the caches: Contents of caches may change at very short time-scales Request-to-cache routing Mostly focused on routing requests to the content origin Search content on-path (i.e., along the shortest or default path) Existing Solutions for Content Discovery: Opportunistic on-path Coordinated off-path

Content Discovery in ICN: Request Routing Opportunistic on-path: limited gain Caching: Content is cached on-path as it travels to the user from the content origin Request routing: Route requests to content origin & retrieve content opportunistically from on-path caches E.g., Barebones NDN with default forwarding strategy Coordinated off-path: coordination and communication overhead Caching: content is assigned to off-path caches according to predefined rules Request routing: adheres to the same rules in order to retrieve contents from caches in a coordinated manner E.g., Hash routing: a hash function determines both the placement of content and routing of requests by mapping content identifiers to cache nodes E.g., Coordinate content placement and routing with the control plane: advertise cache contents in the control plane and direct requests to caches

Opportunistic Content Discovery

Opportunistic Content Discovery Stateful forwarding of data packets: data packets leave breadcrumbs Downstream FIB table (D-FIB) FIB Prefix Next-hop /facebook T D-FIB D-FIB R Name Next-hop /…./x.mpg S Name Next-hop /…./x.mpg T Data: 10010101… H2 T U Request: /facebook/user/x.mpg Request: /facebook/user/x.mpg Request: /facebook/user/x.mpg Upstream & downstream. Store state to keep track of the direction (i.e., next hop) in which the Data packets were sent in the past. Multiple copies of the data … Request: /facebook/user/x.mpg Request: /facebook/user/x.mpg Request: /facebook/user/x.mpg FIB S Prefix Next-hop /facebook U FIB Prefix Next-hop /facebook T H1

Opportunistic Content Discovery: Downstream FIB Table Caches trails of data packets towards users LRU policy An exact match table

Opportunistic Content Discovery: Routing using D-FIB & FIB Goal: improve cache hits Reduce latency in obtaining content limit overhead and reduce the number of requests reaching the content origin Each request is associated with a Total Forwarding Counter (TFC) value spend it on sending a copy of a request downstream spend it on following the FIB table towards the content origin (upstream) spend it on both (multicast) TFC is initially set by the access router New Forwarding Strategies based on D-FIB Determines how TFC quota is spent at each router

Opportunistic Content Discovery: Downstream FIB Table Multicast requests using FIB and D-FIB Z Q L Name Next-hop /x/y/z Q, Y FIB Prefix Next-hop Distance /x S 4 Request: /x/y/z Off-path T R S Request: /x/y/z Quota = 4 Request: /x/y/z Off-path Once a request is forwarded downstream, it only follows the D-FIB tables. They don’t travel back towards the content origin, following the FIB table N Request: /x/y/z Quota = 4 + 3 Request: /x/y/z Quota = 3 Request: /x/y/z K Y M

Opportunistic Content Discovery: Forwarding Strategies Check Content Store, if no matching content, then: Lookup FIB and D-FIB If D-FIB returns no entries, follow FIB (forward upstream) If D-FIB returns one or more entries, then the forwarding strategy decides what action to perform Two simple strategies: ALL strategy: Send a copy of the request to all the next-hops in the D-FIB entry the cache is closer (number of hops) than the content origin ONE strategy: Send a copy of the request to only one next-hop in the D-FIB entry Freshest entry which is closer than the content origin

Performance Evaluation

Evaluation Implemented our approach in ndnSIM — an ns-3 based simulator Performance metrics: Cache hit ratio: percentage of the interests that have been satisfied Off-path/on-path The minimum hop distance: number of hops traveled by the (first) data arriving at the user from a responding router or the content origin for each successful request The mean traffic overhead: the mean number of hops that the initiated Data packets travel in the network Variables: Cache size at each node D-FIB size w.r.t. content population size Initial Quota

Evaluation: Scenario Using a RocketFuel topology: AS 4755 VSNL (India) 191 nodes: 148 edge, 39 gateway, and 4 backbone routers 242 bi-directional links Request rate: 100 requests/sec Randomly select an edge router Content Population: 10,000 One chunk per item One content server attached to a randomly chosen edge router our results comparing performance of on-path/off-path is best-case scenario Popularity of the items determined by a Zipf law of exponents Zipf parameter z: 0.7 Quota: Shortest path length + 3 Duration: 1 hour (following an hour of warm-up phase)

Evaluation: Impact of Router’s Cache Size Impact of D-FIB size w.r.t. content population on the performance

Evaluation: Impact of Router’s Cache Size Hop distance is slightly better with ALL strategy

Evaluation: Impact of Router’s Cache Size Overhead difference is negligible between ALL and ONE

Evaluation: Impact of D-FIB size

Evaluation: Impact of Initial Quota

Evaluation: Impact of Initial Quota What percentage of the first requests manage to fetch the content?

Future Work Augment the strategies with additional information Thresholds for freshness of state in the D-FIB On-path (i.e., upstream) hints to steer requests along a particular (fresh) downstream trail along the path to the content origin. L T S Z Data: /x/y/z 10010101… Name Next-hop Age Distance x/y/z K T sec. 2 N Y K M

Conclusions Opportunistic scheme to discover content using two simple yet effective strategies Reduces load on the content origin Improves cache hits Adds little overhead Basic framework with opportunities to augment with more sophisticated forwarding strategies

Thank you for listening! Questions?

Backup slides

Zipf Distribution Requests are generated in the network with rate r = {r1,...,rM}, where rm denotes the aggregate incoming request rate (in requests per second) for content item m 2 M. The request rate for each item is determined by its popularity. Here we approximate the popularity of the items by a Zipf law of exponents z [20]. In that way the aggregate incoming request rate (in requests per second) for an information item m 2 M is given by: rm=z· 1/kz ,