A Survey on Content-Oriented Networking for Efficient Content Delivery

Slides:



Advertisements
Similar presentations
Quality-of-Service Routing in IP Networks Donna Ghosh, Venkatesh Sarangan, and Raj Acharya IEEE TRANSACTIONS ON MULTIMEDIA JUNE 2001.
Advertisements

Push Technology Humie Leung Annabelle Huo. Introduction Push technology is a set of technologies used to send information to a client without the client.
CAN 1.Distributed Hash Tables a)DHT recap b)Uses c)Example – CAN.
Efficient Event-based Resource Discovery Wei Yan*, Songlin Hu*, Vinod Muthusamy +, Hans-Arno Jacobsen +, Li Zha* * Chinese Academy of Sciences, Beijing.
Clayton Sullivan PEER-TO-PEER NETWORKS. INTRODUCTION What is a Peer-To-Peer Network A Peer Application Overlay Network Network Architecture and System.
Location vs. Identities in Internet Content: Applying Information-Centric Principles in Today’s Networks Instructor: Assoc. Prof. Chung-Horng Lung Group.
Small-world Overlay P2P Network
Mohamed Hefeeda 1 School of Computing Science Simon Fraser University, Canada ISP-Friendly Peer Matching without ISP Collaboration Mohamed Hefeeda (Joint.
Named Data Networking for Social Network Content delivery P. Truong, B. Mathieu (Orange Labs), K. Satzke (Alu) E. Stephan (Orange Labs) draft-truong-icnrg-ndn-osn-00.txt.
A Comparison of Layering and Stream Replication Video Multicast Schemes Taehyun Kim and Mostafa H. Ammar.
©NEC Laboratories America 1 Hui Zhang Samrat Ganguly Sudeept Bhatnagar Rauf Izmailov NEC Labs America Abhishek Sharma University of Southern California.
Peer-to-Peer Based Multimedia Distribution Service Zhe Xiang, Qian Zhang, Wenwu Zhu, Zhensheng Zhang IEEE Transactions on Multimedia, Vol. 6, No. 2, April.
Slide Set 15: IP Multicast. In this set What is multicasting ? Issues related to IP Multicast Section 4.4.
Efficient Content Location Using Interest-based Locality in Peer-to-Peer Systems Presented by: Lin Wing Kai.
Performance Evaluation of Peer-to-Peer Video Streaming Systems Wilson, W.F. Poon The Chinese University of Hong Kong.
1 An Overlay Scheme for Streaming Media Distribution Using Minimum Spanning Tree Properties Journal of Internet Technology Volume 5(2004) No.4 Reporter.
Chord-over-Chord Overlay Sudhindra Rao Ph.D Qualifier Exam Department of ECECS.
© 2009 AT&T Intellectual Property. All rights reserved. Multimedia content growth: From IP networks to Medianets Cisco-IEEE ComSoc Webinar. Sept. 23, 2009.
1 Content Distribution Networks. 2 Replication Issues Request distribution: how to transparently distribute requests for content among replication servers.
Ad Hoc Networking via Named Data Michael Meisel, Vasileios Pappas, and Lixia Zhang UCLA, IBM Research MobiArch’10, September 24, Shinhaeng.
Application-Layer Anycasting By Samarat Bhattacharjee et al. Presented by Matt Miller September 30, 2002.
Network Aware Resource Allocation in Distributed Clouds.
Aadil Zia Khan and Shahab Baqai LUMS School of Science and Engineering QoS Aware Path Selection in Content Centric Networks Fahad R. Dogar Carnegie Mellon.
TOMA: A Viable Solution for Large- Scale Multicast Service Support Li Lao, Jun-Hong Cui, and Mario Gerla UCLA and University of Connecticut Networking.
Optimal Content Delivery with Network Coding Derek Leong, Tracey Ho California Institute of Technology Rebecca Cathey BAE Systems CISS 2009 March 19, 2009.
Adaptive Web Caching CS411 Dynamic Web-Based Systems Flying Pig Fei Teng/Long Zhao/Pallavi Shinde Computer Science Department.
Paper # – 2009 A Comparison of Heterogeneous Video Multicast schemes: Layered encoding or Stream Replication Authors: Taehyun Kim and Mostafa H.
Communication Paradigm for Sensor Networks Sensor Networks Sensor Networks Directed Diffusion Directed Diffusion SPIN SPIN Ishan Banerjee
An IP Address Based Caching Scheme for Peer-to-Peer Networks Ronaldo Alves Ferreira Joint work with Ananth Grama and Suresh Jagannathan Department of Computer.
Content-oriented Networking Platform: A Focus on DDoS Countermeasure ( In incremental deployment perspective) Authors: Junho Suh, Hoon-gyu Choi, Wonjun.
Multimedia & Mobile Communications Lab.
1. Outline  Introduction  Different Mechanisms Broadcasting Multicasting Forward Pointers Home-based approach Distributed Hash Tables Hierarchical approaches.
Push Technology Humie Leung Annabelle Huo. Introduction Push technology is a set of technologies used to send information to a client without the client.
Plethora: Infrastructure and System Design. Introduction Peer-to-Peer (P2P) networks: –Self-organizing distributed systems –Nodes receive and provide.
Overlay Networks : An Akamai Perspective
Content Delivery Networks: Status and Trends Speaker: Shao-Fen Chou Advisor: Dr. Ho-Ting Wu 5/8/
P2P Search COP P2P Search Techniques Centralized P2P systems  e.g. Napster, Decentralized & unstructured P2P systems  e.g. Gnutella.
Multicast in Information-Centric Networking March 2012.
Mobile IP THE 12 TH MEETING. Mobile IP  Incorporation of mobile users in the network.  Cellular system (e.g., GSM) started with mobility in mind. 
Fall, 2001CS 6401 Switching and Routing Outline Routing overview Store-and-Forward switches Virtual circuits vs. Datagram switching.
Authors: Jiang Xie, Ian F. Akyildiz
Distributed Mobility Management for Future 5G Networks : Overview and Analysis of Existing Approaches IEEE Wireless Communications January 2015 F. Giust,
Nuno Salta Supervisor: Manuel Ricardo Supervisor: Ricardo Morla
Content Distribution Networks
Zueyong Zhu† and J. William Atwood‡
Pastry Scalable, decentralized object locations and routing for large p2p systems.
Peer-to-Peer Data Management
Mohammad Malli Chadi Barakat, Walid Dabbous Alcatel meeting
Impact of Neighbor Selection on Performance and Resilience of Structured P2P Networks Sushma Maramreddy.
A Survey on Content-Oriented Networking for Efficient Content Delivery
CHAPTER 3 Architectures for Distributed Systems
CCN application-domains: brainstorming from GreenICN project
Net 323 D: Networks Protocols
Plethora: Infrastructure and System Design
nTorrent: Peer-to-Peer File Sharing in Named Data Networking
ECE 4450:427/527 - Computer Networks Spring 2017
Statistical Optimal Hash-based Longest Prefix Match
5.2 FLAT NAMING.
Data and Computer Communications
Privacy in Content-Oriented Networking: Threats and Countermeasures
An Update on Multihoming in IPv6 Report on IETF Activity
Content Distribution Networks + P2P File Sharing
IPFS: Interplanetary File Systems
Dynamic Replica Placement for Scalable Content Delivery
Taehyun Kim and Mostafa H. Ammar
EE 122: Lecture 22 (Overlay Networks)
New York Institute of Technology- Amman Campus
2019/5/13 A Weighted ECMP Load Balancing Scheme for Data Centers Using P4 Switches Presenter:Hung-Yen Wang Authors:Peng Wang, George Trimponias, Hong Xu,
A Semantic Peer-to-Peer Overlay for Web Services Discovery
Content Distribution Networks + P2P File Sharing
Presentation transcript:

A Survey on Content-Oriented Networking for Efficient Content Delivery Jaeyoung Choi, Jinyoung Han, Eunsang Cho, Ted “Taekyoung” Kwon, and Yanghee Choi - IEEE Communications Magazine - March 2011 Seoul National University

ABSTRACT As the volume of multimedia content increases, the current internet architecture will become inefficient in delivering time sensitive multimedia traffic. To address this issue, CON decouples content from the host at the networking layer. This paper presents comprehensive survey on content naming and name based routing, and also discusses research issues in CON. This paper also quantitatively compares the CON routing proposals, and evaluate the impact of publish/subscribe paradigm and in-network caching.

INTRODUCTION Video traffic has been continuously increasing in the internet and some CP like YouTube and Hulu have even began to provide HD video streaming services. As the bitrate of multimedia traffic increases, the TCP/IP architecture will fail to deliver time sensitive multimedia information. Another important multimedia application is multicasting/broadcasting over IP networks. However, the endpoint based internet is not suitable for multicast/broadcast due to issues of multicast address assignment and complex group management.

INTRODUCTION Currently, many voluminous multimedia contents are delivered to numerous users by P2P systems such as Bittorrent. From a networking perspective, the delivery performance of bittorrent is inefficient since a peer can download files only from a small subset of peers who may be distantly located. P2P have limited information on peers downloading the same content and the network topology between them In these applications, the end user cares not about the host, but about the content. This mismatch leads to application specific solution which may be costly and inefficient.

INTRODUCTION To address the above mismatch , CON strives to redesign the current Internet architecture to accommodate content oriented applications efficiently and scalably. The essence of CON lies in decoupling contents from host not at the application level but at network level. The paper argues that the new CON paradigm will: Free application/service developers from reinventing application-specific delivery mechanisms. Provide scalable and efficient delivery of requested contents (e.g., by supporting multicast/broadcast/anycast naturally).

CON Architecture A CON architecture has four main building blocks: • How to name the contents • How to locate the contents (routing) • How to deliver/disseminate the contents • How to cache the contents “in” the network

CON Characteristics The 3 characteristics of CON : First, a CON node performs routing by content names, not by (host) locator. This means two radical changes: Identifying hosts is replaced by identifying contents. The location of a content file is independent of its name. Second, the publish/subscribe paradigm is the main communication model in CON: a content source announces (or publishes) a content file, while a user requests (or subscribes to) the content file.

CON Characteristics Third, the authenticity of contents can easily be verified by leveraging public key cryptography. In IP networking, a host address seen by a user is irrelevant to its content name, which results in phishing attacks. For content authentication in CON, either a self-certifying content name or a signature in a packet is used.

Naming schemes used in CON Hierarchical Naming: In this a content file is often named by an identifier like a web URL (e.g. /www.acme.com/main/logo.jpg) Thus this naming mechanism, used by CCN and TRIAD, is compatible with the current URL based applications, which may imply a lower deployment hurdle. Its hierarchical nature can help mitigate the routing scalability issue since routing entries for contents might be aggregated. Drawbacks: Persistence

Naming schemes used in CON Flat Naming To avoid the above shortcomings, DONA and PSIRP employ flat and self-certifying names by defining a content identifier as a cryptographic hash of a public key. Due to its flatness , persistence and uniqueness are achieved. Drawbacks: Flat naming aggravates the routing scalability problem due to no possibility of aggregation. As flat names are not human-readable, an additional “resolution” between (application-level) human-readable names and content names is needed.

Naming schemes used in CON Attribute based Naming CBCB proposal identifies contents with a set of attribute-value pairs (AVPs). Since a user specifies her interests with a conjunction and disjunction of AVPs, a CON node can locate eligible contents by comparing the interest with advertised AVPs from content sources. It can facilitate in-network searching. (and routing), which is performed by external searching engines in the current Internet. Drawbacks: An AVP may not be unique or well defined. The number of possible AVPs can be huge

Routing Schemes in CON Unstructured Routing Like IP routing, this approach assumes no structure to maintain routing tables; hence, the routing advertisement (for contents) is mainly performed based on flooding. Just as network prefixes are aggregatable in IP routing, so are content identifiers in name based routing. Drawback: as a content file is increasingly replicated or moved, the level of aggregation diminishes.

Routing Schemes in CON Structured Routing Two structures have been proposed: a tree and a distributed hash table (DHT). DONA is the most representative tree-based routing scheme. Routers in DONA form a hierarchical tree, and each router maintains the routing information of all the contents published in its descendant routers. This approach imposes an increasing routing burden as the level of a router becomes higher. The root router should have the routing information of all the contents in the network.

NAME-BASED ROUTING Structured Routing On the other hand, PSIRP adopts hierarchical DHTs The flatness of a DHT imposes an equal and scalable routing burden among routers. If the number of contents is C, each router should have log(C) routing entries Drawback: the DHT is constructed by random and uniform placement of routers, and thus typically exhibits a few times longer paths than a tree that can exploit the information of network topology.

Present Internet vs CON Current Internet Current Internet architecture : TCP/IP -> Point to Point (1:1) New Applications like Online Streaming and IPTV services require different connectivities: one-to-many (1:N) and many-to-many (M:N) (IETF) standardized the IP multicasting framework. But it is very limited. Content Oriented Network (CON) CON accommodates 1:N connectivity naturally by the publish-subscribe paradigm. However, its link efficiency is not different from IP multicasting. Hence, this paper focuses more on M:N connectivity. M:N connectivity :- (a) M instances of 1:N connectivity (e.g., videoconference). (b) M sources disseminate different parts of a content file to N recipients (P2P, Multiplayer Gaming)

Present Internet vs CON Substantiating M:N connectivity requires application specific overlays or relay mechanisms in the current Internet. But, CON can disseminate contents more efficiently at the network level by spatial decoupling of the publish/subscribe paradigm and content awareness at network nodes. Demonstration: In the figure P2P overlays are formed, and the peers in both overlays wish to download the same file. Unfortunately, peers in each overlay are distant; hence, the throughput is poor, which happens frequently in reality. This is because P2P systems are application-level solutions that cannot exploit network topology information. In contrast, CON can efficiently disseminate a content file among subscribers since CON nodes (R2 and R4) will help them download the content file also from the other overlay

Con Node 2 Con Node 1

OPEN ISSUES WITH CON Each CON node may have to keep track of individual sources of the same content (e.g., CCN and DONA). In this case, a CON node can seek to retrieve different parts of the requested content in parallel from multiple sources to expedite dissemination. There were no prior studies on this multisource dissemination at a networking level at the time the paper was written.. Depending on round trip times and traffic dynamics of the path to each source, the CON node should dynamically decide/adjust which part of the content file is to be received from each source (M:N). Another relevant issue is what routing information should be stored and advertised by each CON node for multiple sources of the same content. This will contribute to significant amount of network traffic.

OPEN ISSUES WITH CON How to design a routing protocol for multiple sources, both intradomain and interdomain for CON? There have been recent studies on distributed caching (e.g., how to locate caching points and how to cache contents). But, as they assume IP networking, their work is limited in that Only a single source (or cache) delivers the content file to a subscriber. Presently very limited topologies (e.g. tree) or places (e.g. point of presence) are taken into account.

IN-NETWORK CACHING AND ADVANTAGES Con Nodes in the network maintain a cache to provide faster access to the content file. Advantages: To improve the delay/throughput by placing the contents closer to their users. An ISP with in-network caching capability can also offer CDN-like businesses to CPs if the majority of potential subscribers to the CPs are connected to the ISP. ISPs, CPs can save costs.

SIMULATION EXPERIMENTS Two experiments are done via simulation to find out: The effect of routing structures on the resolution time (or delay) to locate a content file How much traffic load can be reduced by in-network caching network-wide

SIMULATION EXPERIMENTS - THE SETUP For the experiment, In addition to tree and DHT structures, a new routing structure: Two-Tier is introduced. Using GT-ITM model, a physical-transit stub topology is generated, where a single transit domain connects 10 stub domains. Total Nodes in the network : 310 whose links have 10 Gb/s bandwidth capacity, among which 100 nodes in the stub domains are selected as CON nodes. Four types of content files are published in the end hosts: video, audio, software, and web contents, with 68, 9, 9, and 14 percent in terms of the content volume, respectively. For each content type, 1000 content files are published and evenly distributed among the end hosts. The popularity (or request probability) of a particular content file is determined by the Zipf distribution whose parameter is set to 1.0. The arrival rate of subscriptions (or request rate) is set to 0.5 s–1.

SIMULATION EXPERIMENTS - THE OBSERVATION • Tree routing achieves higher throughput than DHT routing. • DHT routing is more scalable in terms of routing burden and more resilient to node/link failures due to multiple paths than tree routing. TWO -TEIR structure: Compromise between high throughput and routing scalability. DHT is the high tier. Tree is the low tier.

RESULTS...

COMPARISON OF ROUTING STRUCTURES w.r.t. RESOLUTION TIME

Here R means that each of 100 CON nodes will fail for one hour once during a simulation run on average. Greater R means each CON node fails for longer duration.

SIMULATION EXPERIMENT 2 - NETWORK TRAFFIC LOAD In the second experiment we demonstrate how much traffic load is reduced by CON. We compare DONA (tree structure), two-tier, and the current Internet. The cache size of each CON node is 5 Gbytes. Note that there is no publish/subscribe paradigm and in-network caching in the current Internet.

Conclusion To fundamentally solve the mismatch between content-oriented Internet usage and host-based Internet architecture, content-oriented networking studies have been proliferated with a focus on naming and routing. We classify and compare the prior proposals in terms of naming and routing criteria. We identify two important research topics in CON environments: • How to disseminate contents from multiple sources • How to decide which contents to cache in distributed environments We also compare CON routing structures and demonstrate the performance gain of CON over IP networking. For future work, an interesting topic would be to compare the in-network caching part of CON proposals and CDN solutions in terms of network traffic load mitigation