skip to main content
10.1145/2342488.2342491acmconferencesArticle/Chapter ViewAbstractPublication PagescommConference Proceedingsconference-collections
research-article
Free access

Exploit the known or explore the unknown?: hamlet-like doubts in ICN

Published: 17 August 2012 Publication History

Abstract

Most Information Centric Networking designs propose the usage of widely distributed in-network storage. However, the huge amount of content exchanged in the Internet, and the volatility of content replicas cached across the network pose significant challenges to the definition of a scalable routing protocol able to address all available copies. In addition, the number of available copies of a given content item and their distribution among caches is clearly impacted by the request forwarding policy.
In this paper we gather initial design considerations for an ICN request forwarding strategy by spanning over two extremes: a deterministic exploitation of forwarding information towards a "known" copy and a random network exploration towards an "unknown" copy, via request flooding. By means of packet-level simulations, we investigate the performance trade-offs of exploitation/exploration approaches, and introduce an hybrid solution. Our forwarding scheme shows a good potential, whether carefully tuned, in terms of delivery performance, implicit cache coordination and possible reduction of forwarding table size.

References

[1]
ccnsim homepage. http://www.telecom-paristech.fr/~drossi/ccnSim.
[2]
B. Ahlgren, C. Dannewitz, C. Imbrenda, D. Kutscher, and B. Ohlman. A Survey of Information-Centric Networking. In Dagstuhl ICN Seminar, 2011.
[3]
T. Bektaş, J.F. Cordeau, E. Erkut, and G. Laporte. Exact algorithms for the joint object placement and request routing problem in content distribution networks. Comput. Oper. Res., 35(12):3860--3884, 2008.
[4]
M. Bjorkqvist, L. Chen, M. Vukolic, and X. Zhang. Minimizing retrieval latency for content cloud. In IEEE INFOCOM, 2011.
[5]
S. Borst, V. Gupta, and A. Walid. Distributed caching algorithms for content distribution networks. In IEEE INFOCOM, pages 1478--1486, 2010.
[6]
J. Dai, Z. Hu, B. Li, J. Liu, and B. Li. Collaborative hierarchical caching with dynamic request routing for massive content distribution. In IEEE INFOCOM, 2012.
[7]
A. Ghodsi, S. Shenker, T. Koponen, A. Singla, B. Raghavan, and J. Wilcox. Information-centric networking: seeing the forest for the trees. In ACM HotNets, New York, NY, USA, 2011. ACM.
[8]
V. Jacobson, D. Smetters, J. Thornton, M. F. Plass, N. Briggs, and R. Braynard. Networking named content. In Proceedings of ACM CoNEXT, Rome, Italy, 2009.
[9]
D. Karger, E. Lehman, T. Leighton, R. Panigrahy, M. Levine, and D. Lewin. Consistent hashing and random trees: distributed caching protocols for relieving hot spots on the world wide web. In ACM STOC, pages 654--663, 1997.
[10]
T. Koponen, M. Chawla, B.-G. Chun, A. Ermolinskiy, K. H. Kim, S. Shenker, and I. Stoica. A Data-Oriented (and Beyond) Network Architecture. In ACM SIGCOMM '07, Kyoto, Japan, Aug. 2007.
[11]
N. Laoutaris, G. Zervas, A. Bestavros, and G. Kollios. The cache inference problem and its application to content and request routing. In IEEE INFOCOM, 2007.
[12]
Z. Li and G. Simon. Time-shifted tv in content centric networks: The case for cooperative in-network caching. In IEEE ICC, 2011.
[13]
A. Narayanan and D. Oran. Content Routing using Internet Routing Protocols: Can it scale? IETF-82, ICNRG BAR BOF, November 2011. URL: http://trac.tools.ietf.org/group/irtf/trac/wiki/icnrg.
[14]
E. J. Rosensweig and J. Kurose. Breadcrumbs: Efficient, best-effort content location in cache networks. In IEEE INFOCOM, 2009.
[15]
D. Thaler and C. V. Ravishankar. Using name-based mappings to increase hit rates. IEEE/ACM Trans. Networking, 6(1):1--14.
[16]
M. Varvello, I. Rimac, and U. Lee. On the design of content-centric manets. 2011.
[17]
Y. Wang and K. Lee. Advertising cached contents in the control plane: Necessity and feasibility. In IEEE INFOCOM, NOMEN Workshop, 2012.

Cited By

View all

Index Terms

  1. Exploit the known or explore the unknown?: hamlet-like doubts in ICN

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      ICN '12: Proceedings of the second edition of the ICN workshop on Information-centric networking
      August 2012
      106 pages
      ISBN:9781450314794
      DOI:10.1145/2342488
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 17 August 2012

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. caching
      2. forwarding
      3. information centric networking

      Qualifiers

      • Research-article

      Conference

      SIGCOMM '12
      Sponsor:
      SIGCOMM '12: ACM SIGCOMM 2012 Conference
      August 17, 2012
      Helsinki, Finland

      Acceptance Rates

      Overall Acceptance Rate 133 of 482 submissions, 28%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)82
      • Downloads (Last 6 weeks)5
      Reflects downloads up to 09 Jan 2025

      Other Metrics

      Citations

      Cited By

      View all

      View Options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Login options

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media