144 research outputs found

    Blockchain-Enabled On-Path Caching for Efficient and Reliable Content Delivery in Information-Centric Networks

    Get PDF
    As the demand for online content continues to grow, traditional Content Distribution Networks (CDNs) are facing significant challenges in terms of scalability and performance. Information-Centric Networking (ICN) is a promising new approach to content delivery that aims to address these issues by placing content at the center of the network architecture. One of the key features of ICNs is on-path caching, which allows content to be cached at intermediate routers along the path from the source to the destination. On-path caching in ICNs still faces some challenges, such as the scalability of the cache and the management of cache consistency. To address these challenges, this paper proposes several alternative caching schemes that can be integrated into ICNs using blockchain technology. These schemes include Bloom filters, content-based routing, and hybrid caching, which combine the advantages of off-path and on-path cachings. The proposed blockchain-enabled on-path caching mechanism ensures the integrity and authenticity of cached content, and smart contracts automate the caching process and incentivize caching nodes. To evaluate the performance of these caching alternatives, the authors conduct experiments using real-world datasets. The results show that on-path caching can significantly reduce network congestion and improve content delivery efficiency. The Bloom filter caching scheme achieved a cache hit rate of over 90% while reducing the cache size by up to 80% compared to traditional caching. The content-based routing scheme also achieved high cache hit rates while maintaining low latency

    Efficient content delivery through fountain coding in opportunistic information-centric networks

    Get PDF
    Opportunistic networks can increase network capacity, support collaborative downloading of content and offload traffic from a cellular to a cellular-assisted, device-to-device network. They can also support communication and content exchange when the cellular infrastructure is under severe stress and when the network is down or inaccessible. Fountain coding has been considered as espe- cially suitable for lossy networks, providing reliable multicast transport without requiring feedback from receivers. It is also ideal for multi-path and multi- source communication that fits exceptionally well with opportunistic networks. In this paper, we propose a content-centric approach for disseminating con- tent in opportunistic networks efficiently and reliably. Our approach is based on Information-Centric Networking (ICN) and employs fountain coding. When tied together, ICN and fountain coding provide a comprehensive solution that overcomes significant limitations of existing approaches. Extensive network simulations indicate that our approach is viable. Cache hit ratio can be increased by up to five times, while the overall network traffic load is reduced by up to four times compared to content dissemination on top of the standard Named Data Networking architecture

    Information-centric communication in mobile and wireless networks

    Get PDF
    Information-centric networking (ICN) is a new communication paradigm that has been proposed to cope with drawbacks of host-based communication protocols, namely scalability and security. In this thesis, we base our work on Named Data Networking (NDN), which is a popular ICN architecture, and investigate NDN in the context of wireless and mobile ad hoc networks. In a first part, we focus on NDN efficiency (and potential improvements) in wireless environments by investigating NDN in wireless one-hop communication, i.e., without any routing protocols. A basic requirement to initiate informationcentric communication is the knowledge of existing and available content names. Therefore, we develop three opportunistic content discovery algorithms and evaluate them in diverse scenarios for different node densities and content distributions. After content names are known, requesters can retrieve content opportunistically from any neighbor node that provides the content. However, in case of short contact times to content sources, content retrieval may be disrupted. Therefore, we develop a requester application that keeps meta information of disrupted content retrievals and enables resume operations when a new content source has been found. Besides message efficiency, we also evaluate power consumption of information-centric broadcast and unicast communication. Based on our findings, we develop two mechanisms to increase efficiency of information-centric wireless one-hop communication. The first approach called Dynamic Unicast (DU) avoids broadcast communication whenever possible since broadcast transmissions result in more duplicate Data transmissions, lower data rates and higher energy consumption on mobile nodes, which are not interested in overheard Data, compared to unicast communication. Hence, DU uses broadcast communication only until a content source has been found and then retrieves content directly via unicast from the same source. The second approach called RC-NDN targets efficiency of wireless broadcast communication by reducing the number of duplicate Data transmissions. In particular, RC-NDN is a Data encoding scheme for content sources that increases diversity in wireless broadcast transmissions such that multiple concurrent requesters can profit from each othersโ€™ (overheard) message transmissions. If requesters and content sources are not in one-hop distance to each other, requests need to be forwarded via multi-hop routing. Therefore, in a second part of this thesis, we investigate information-centric wireless multi-hop communication. First, we consider multi-hop broadcast communication in the context of rather static community networks. We introduce the concept of preferred forwarders, which relay Interest messages slightly faster than non-preferred forwarders to reduce redundant duplicate message transmissions. While this approach works well in static networks, the performance may degrade in mobile networks if preferred forwarders may regularly move away. Thus, to enable routing in mobile ad hoc networks, we extend DU for multi-hop communication. Compared to one-hop communication, multi-hop DU requires efficient path update mechanisms (since multi-hop paths may expire quickly) and new forwarding strategies to maintain NDN benefits (request aggregation and caching) such that only a few messages need to be transmitted over the entire end-to-end path even in case of multiple concurrent requesters. To perform quick retransmission in case of collisions or other transmission errors, we implement and evaluate retransmission timers from related work and compare them to CCNTimer, which is a new algorithm that enables shorter content retrieval times in information-centric wireless multi-hop communication. Yet, in case of intermittent connectivity between requesters and content sources, multi-hop routing protocols may not work because they require continuous end-to-end paths. Therefore, we present agent-based content retrieval (ACR) for delay-tolerant networks. In ACR, requester nodes can delegate content retrieval to mobile agent nodes, which move closer to content sources, can retrieve content and return it to requesters. Thus, ACR exploits the mobility of agent nodes to retrieve content from remote locations. To enable delay-tolerant communication via agents, retrieved content needs to be stored persistently such that requesters can verify its authenticity via original publisher signatures. To achieve this, we develop a persistent caching concept that maintains received popular content in repositories and deletes unpopular content if free space is required. Since our persistent caching concept can complement regular short-term caching in the content store, it can also be used for network caching to store popular delay-tolerant content at edge routers (to reduce network traffic and improve network performance) while real-time traffic can still be maintained and served from the content store

    ์ •๋ณด ์ค‘์‹ฌ ๋„คํŠธ์›Œํ‚น์—์„œ์˜ ์ฝ˜ํ…ํŠธ ํƒ์ƒ‰ ๋ฐ ๋ฐ์ดํ„ฐ ์˜คํ”„๋กœ๋”ฉ

    Get PDF
    ํ•™์œ„๋…ผ๋ฌธ (๋ฐ•์‚ฌ)-- ์„œ์šธ๋Œ€ํ•™๊ต ๋Œ€ํ•™์› : ์ „๊ธฐยท์ปดํ“จํ„ฐ๊ณตํ•™๋ถ€, 2015. 8. ๊ถŒํƒœ๊ฒฝ.ํ˜„์žฌ์˜ ์ธํ„ฐ๋„ท์€ ์ž์› ๊ณต์œ ๋ฅผ ๋ชฉ์ ์œผ๋กœ ํ˜ธ์ŠคํŠธ๊ฐ„ ํ†ต์‹  ํŒจ๋Ÿฌ๋‹ค์ž„์— ๊ธฐ๋ฐ˜ํ•˜์—ฌ ์„ค๊ณ„๋˜์—ˆ์ง€๋งŒ, ์˜ค๋Š˜๋‚  ์ธํ„ฐ๋„ท ์‚ฌ์šฉ ํŒจํ„ด์€ ์ฝ˜ํ…ํŠธ ํš๋“์— ์ง‘์ค‘๋˜์–ด์žˆ๋‹ค. ์ด๋Ÿฌํ•œ ์ด์œ ๋กœ, ๋Œ€๋ถ€๋ถ„์˜ ์ธํ„ฐ๋„ท ํŠธ๋ž˜ํ”ฝ์€ ๋น„๋””์˜ค ์„œ๋น„์Šค๋‚˜ P2P ํŒŒ์ผ ๊ณต์œ ์™€ ๊ฐ™์€ ์ฝ˜ํ…ํŠธ ํš๋“์— ์˜ํ•ด ๋ฐœ์ƒํ•˜๊ณ  ์žˆ๋Š” ์ƒํ™ฉ์ด๋‹ค. ํ•˜์ง€๋งŒ, ํ˜„์žฌ ์ธํ„ฐ๋„ท์˜ ๊ตฌ์กฐ์™€ ์‹ค์ œ ์‚ฌ์šฉ ํŒจํ„ด์˜ ๊ดด๋ฆฌ๋Š” ๋น„ํšจ์œจ์ ์ธ ์ฝ˜ํ…ํŠธ ์ „๋‹ฌ (์˜ˆ, ๋™์ผํ•œ ์ธ๊ธฐ์žˆ๋Š” ์ฝ˜ํ…ํŠธ์— ๋Œ€ํ•œ ์ค‘๋ณต๋œ ์ฝ˜ํ…ํŠธ ์ „์†ก)์„ ์•ผ๊ธฐํ•˜๊ณ  ์žˆ๊ณ , ์ด๋Š” ํŠธ๋ž˜ํ”ฝ ํญ๋ฐœ ๋ฌธ์ œ๋กœ ์ด์–ด์ง€๊ณ  ์žˆ๋‹ค. ์ด๋Ÿฌํ•œ ์ด์Šˆ๋ฅผ ๋‹ค๋ฃจ๊ธฐ ์œ„ํ•ด (i) ์ธํ„ฐ๋„ท ๊ตฌ์กฐ๋ฅผ ์ƒˆ๋กญ๊ฒŒ ์„ค๊ณ„ํ•˜๊ฑฐ๋‚˜ (ii) ๋ฐ์ดํ„ฐ ์˜คํ”„๋กœ๋”ฉ ๊ธฐ๋ฒ•์„ ํ†ตํ•ด ๋„คํŠธ์›Œํฌ ํŠธ๋ž˜ํ”ฝ์„ ์ค„์ด๋ ค๋Š” ์‹œ๋„๋“ค์ด ์žˆ๋‹ค. ๋ณธ ํ•™์œ„ ๋…ผ๋ฌธ์—์„œ๋Š” ์ •๋ณด ์ค‘์‹ฌ ๋„คํŠธ์›Œํ‚น๊ณผ ์ •๋ณด ์ค‘์‹ฌ์˜ ์ฐจ๋Ÿ‰ ๋„คํŠธ์›Œํฌ๋ผ๋Š” ๋‘๊ฐ€์ง€ ์˜์—ญ์—์„œ์˜ ํŠธ๋ž˜ํ”ฝ ๊ฐ์†Œ ๊ธฐ๋ฒ•์— ๋Œ€ํ•ด ํƒ๊ตฌํ•œ๋‹ค. ์ฒซ ๋ฒˆ์งธ๋กœ, ์ •๋ณด ์ค‘์‹ฌ ๋„คํŠธ์›Œํ‚น์„ ์œ„ํ•œ ํŠธ๋ž˜ํ”ฝ ๊ฐ์†Œ ์ฝ˜ํ…ํŠธ ํƒ์ƒ‰ ๊ธฐ๋ฒ•์„ ์ œ์•ˆํ•œ๋‹ค. ์ •๋ณด ์ค‘์‹ฌ ๋„คํŠธ์›Œํ‚น์€ ํŠธ๋ž˜ํ”ฝ ํญ๋ฐœ๊ณผ ๊ฐ™์€ ํ˜„์žฌ ์ธํ„ฐ๋„ท์˜ ๋ฌธ์ œ์ ์„ ํ•ด๊ฒฐํ•˜๊ธฐ ์œ„ํ•ด, ์ดˆ๊ธฐ ๋‹จ๊ณ„๋ถ€ํ„ฐ ์ธํ„ฐ๋„ท ๊ตฌ์กฐ๋ฅผ ์ƒˆ๋กญ๊ฒŒ ์„ค๊ณ„ํ•˜์ž๋Š” ๋ฐฉํ–ฅ์œผ๋กœ ์ œ์•ˆ๋˜์—ˆ๋‹ค. ์ •๋ณด ์ค‘์‹ฌ ๋„คํŠธ์›Œํ‚น์€ ๊ฐ€๊นŒ์ด์— ์กด์žฌํ•˜๋Š” ์บ์‹œ๋œ ์ฝ˜ํ…ํŠธ๋ฅผ ์ด์šฉํ•˜๊ฑฐ๋‚˜ ๋™์ผํ•œ ์ฝ˜ํ…ํŠธ ์ „์†ก์— ๋Œ€ํ•œ ์ค‘๋ณต๋œ ์ „์†ก์„ ์ค„์ด๋Š” ๊ฒƒ์„ ํ†ตํ•ด ๋„คํŠธ์›Œํฌ ํŠธ๋ž˜ํ”ฝ ๊ฐ์†Œ์™€ ๊ฐ™์€ ์ด๋“์„ ์ œ๊ณตํ•  ์ˆ˜ ์žˆ๋‹ค. ํ•˜์ง€๋งŒ, ์ด์ „์˜ ์—ฐ๊ตฌ๋“ค์€ ์ด๋Ÿฌํ•œ ์บ์‹œ๋œ ์ฝ˜ํ…ํŠธ๋ฅผ ์ด์šฉํ•˜๊ธฐ ์œ„ํ•ด ๊ธฐํšŒ์ฃผ์˜์  ์บ์‹œ ์ผ์น˜ ๋ฐฉ์‹์— ์˜์กด์„ ํ•˜๊ณ  ์žˆ๋‹ค. ์ด๋Ÿฌํ•œ ๋ฐฉ์‹์€ ์ฝ˜ํ…ํŠธ ์†Œ์Šค๋กœ ๊ฐ€๋Š” ๊ฒฝ๋กœ์— ์กด์žฌํ•˜๋Š” ์บ์‹œ๋œ ์ฝ˜ํ…ํŠธ๋งŒ ์ด์šฉํ•  ์ˆ˜ ์žˆ๊ธฐ ๋•Œ๋ฌธ์— ๋„คํŠธ์›Œํฌ ๊ณณ๊ณณ์— ์žˆ๋Š” ๋„คํŠธ์›Œํฌ ๋‚ด์žฌ ์ €์žฅ ๊ณต๊ฐ„์„ ์ถฉ๋ถ„ํžˆ ์ด์šฉํ•˜์ง€ ๋ชปํ•˜๋Š” ํ•œ๊ณ„๊ฐ€ ์žˆ๋‹ค. ์ œ์•ˆํ•˜๋Š” ๊ธฐ๋ฒ•์ธ SCAN์€ ๋„คํŠธ์›Œํฌ์— ์‚ฐ์žฌ๋œ ์บ์‹œ๋œ ์ฝ˜ํ…ํŠธ๋ฅผ ๋” ์ž˜ ์ด์šฉํ•˜๊ธฐ ์œ„ํ•ด์„œ ๊ฐ€๊นŒ์ด์— ์กด์žฌํ•˜๋Š” ์บ์‹œ๋œ ์ฝ˜ํ…ํŠธ๋ฅผ ํƒ์ƒ‰ํ•œ๋‹ค. ์ด๋ฅผ ์œ„ํ•ด SCAN์€ ๋ธ”๋ฃธ ํ•„ํ„ฐ๋ฅผ ์‚ฌ์šฉํ•˜์—ฌ ์ฃผ๋ณ€ ๋ผ์šฐํ„ฐ๋“ค ์‚ฌ์ด์—์„œ ์บ์‹œ๋œ ์ฝ˜ํ…ํŠธ์— ๋Œ€ํ•œ ์ •๋ณด๋ฅผ ๊ตํ™˜ํ•œ๋‹ค. ์‹œ๋ฎฌ๋ ˆ์ด์…˜์„ ํ†ตํ•ด SCAN์€ ๊ธฐํšŒ์ฃผ์˜์  ์บ์‹œ ์ผ์น˜ ๋ฐฉ์‹์˜ ๊ธฐ๋ฒ•์— ๋น„ํ•ด ํ‰๊ท  ํ™‰ ๊ฑฐ๋ฆฌ, ํŠธ๋ž˜ํ”ฝ ์–‘, ๋งํฌ๊ฐ„ ๋กœ๋“œ ๋ถ„๋ฐฐ์—์„œ ๋” ๋‚˜์€ ์„ฑ๋Šฅ์„ ๋ณด์ž„์„ ์•Œ ์ˆ˜ ์žˆ๋‹ค. ๋‹ค์Œ์œผ๋กœ, ์ •๋ณด ์ค‘์‹ฌ์˜ ์ฐจ๋Ÿ‰ ๋„คํŠธ์›Œํฌ๋ฅผ ์œ„ํ•œ ํŠธ๋ž˜ํ”ฝ ์˜คํ”„๋กœ๋”ฉ ๊ธฐ๋ฒ•์„ ์ œ์•ˆํ•œ๋‹ค. ๋ฌด์„  ํ™˜๊ฒฝ์—์„œ ๊ธ‰์ฆํ•˜๊ณ  ์žˆ๋Š” ๋ชจ๋ฐ”์ผ ํŠธ๋ž˜ํ”ฝ์€ ๋ชจ๋ฐ”์ผ ๋„คํŠธ์›Œํฌ ์ œ๊ณต์ž์—๊ฒŒ ์‹ฌ๊ฐํ•œ ์šฐ๋ ค๊ฐ€ ๋˜๊ณ  ์žˆ๋‹ค. ์ด๋Ÿฌํ•œ ํŠธ๋ž˜ํ”ฝ ํญ๋ฐœ ๋ฌธ์ œ๋ฅผ ๋‹ค๋ฃจ๊ธฐ ์œ„ํ•ด, ํŠธ๋ž˜ํ”ฝ์„ ์…€๋ฃฐ๋Ÿฌ ๋„คํŠธ์›Œํฌ์—์„œ WiFi ํ•ซ์ŠคํŒŸ์ด๋‚˜ ํŽจํ† ์…€๊ณผ ๊ฐ™์€ ๋‹ค๋ฅธ ๋„คํŠธ์›Œํฌ๋กœ ์˜คํ”„๋กœ๋”ฉํ•˜๋ ค๋Š” ์—ฐ๊ตฌ๋“ค์ด ์žˆ์—ˆ๋‹ค. ๋ณธ ์—ฐ๊ตฌ์—์„œ๋Š” ๊ธฐ์กด์˜ ์‹œ๋„์—์„œ ๋” ๋‚˜์•„๊ฐ€์„œ ๋ฐ์ดํ„ฐ ์˜คํ”„๋กœ๋”ฉ์„ ์œ„ํ•œ ์ฐจ๋Ÿ‰ ๋„คํŠธ์›Œํฌ์˜ ์ž ์žฌ์  ์žฅ์ ์— ์ง‘์ค‘ํ•˜์—ฌ ์ฐจ๋Ÿ‰ ๋„คํŠธ์›Œํฌ๋ฅผ ์ด์šฉํ•œ ๋ฐ์ดํ„ฐ ์˜คํ”„๋กœ๋”ฉ ํ”„๋ ˆ์ž„์›Œํฌ์ธ DOVE๋ฅผ ์ œ์•ˆํ•œ๋‹ค. ์ œ์•ˆํ•˜๋Š” ๋ฐ์ดํ„ฐ ์˜คํ”„๋กœ๋”ฉ ํ”„๋ ˆ์ž„์›Œํฌ๋Š” ์ฐจ๋Ÿ‰ ๋‚ด ๋ฐ์ดํ„ฐ ์„œ๋น„์Šค๋ฅผ ์œ„ํ•ด ํ•„์š”ํ•œ ์…€๋ฃฐ๋Ÿฌ ํŠธ๋ž˜ํ”ฝ์„ ๋น„์šฉ ํšจ๊ณผ๊ฐ€ ๋†’์€ ๋ฐฉ์‹์œผ๋กœ ๊ฐ์†Œ์‹œํ‚ฌ ์ˆ˜ ์žˆ๋‹ค. DOVE์—์„œ๋Š” ์˜คํ”„๋กœ๋”ฉ์„ ๋ชฉ์ ์œผ๋กœ ์ฐจ๋Ÿ‰ ์ด๋™ ๊ฒฝ๋กœ๋ฅผ ์ด์šฉํ•˜๊ณ , ๊ฒฝ์ œ์ ์ธ ๋น„์šฉ ์ ˆ๊ฐ์„ ๋ชฉ์ ์œผ๋กœ ์ฐจ๋Ÿ‰์—์„œ ์š”์ฒญ๋˜๋Š” ์ฝ˜ํ…ํŠธ ํŒŒ์ผ๋“ค์€ ์…€๋ฃฐ๋Ÿฌ ๋„คํŠธ์›Œํฌ ๋Œ€์‹  ์ฐจ๋Ÿ‰ ๋„คํŠธ์›Œํฌ๋ฅผ ํ†ตํ•ด ์ „๋‹ฌ๋œ๋‹ค. ์ด๋ฅผ ์œ„ํ•ด ์˜คํ”„๋กœ๋”ฉ ์œ„์น˜๋ฅผ ์„ ํƒํ•˜๋Š” ๋ฌธ์ œ๋ฅผ ์‹œ๊ณต๊ฐ„์  ์ง‘ํ•ฉ ๋ฎ๊ฐœ ๋ฌธ์ œ๋กœ ๋งŒ๋“ค๊ณ , ์ฐจ๋Ÿ‰ ์ด๋™ ๊ฒฝ๋กœ๋ฅผ ์ด์šฉํ•œ ์‹œ๊ฐ„ ์˜ˆ์ธก ๊ธฐ๋ฐ˜์˜ ์ง‘ํ•ฉ ๋ฎ๊ฐœ ์•Œ๊ณ ๋ฆฌ์ฆ˜์„ ์ œ์•ˆํ•œ๋‹ค. ์‹œ๋ฎฌ๋ ˆ์ด์…˜ ๊ฒฐ๊ณผ์— ๋”ฐ๋ฅด๋ฉด, DOVE ํ”„๋ ˆ์ž„์›Œํฌ๋Š” ์ฐจ๋Ÿ‰ ๋„คํŠธ์›Œํฌ๋ฅผ ํ†ตํ•œ ์˜คํ”„๋กœ๋”ฉ์„ ์ˆ˜ํ–‰ํ•˜์—ฌ 57%์˜ ์…€๋ฃฐ๋Ÿฌ ๋งํฌ ์‚ฌ์šฉ๋Ÿ‰์„ ํฌ๊ฒŒ ๊ฐ์†Œ์‹œํ‚ฌ ์ˆ˜ ์žˆ๋‹ค.While the architecture of current Internet was designed based on the host-to-host communication paradigm for resource sharing, today's Internet usage has been concentrated on content retrievals. As a result, most of Internet traffic is generated by the content retrievals, such as video service and P2P file sharing. However, the discrepancy between the current Internet architecture and the real usage pattern causes inefficient content deliveries (e.g., duplicated content transmission for the same popular content), which leads to traffic explosion problem. To address such issues, there have been a lot of efforts to reduce the network traffic by (i) redesigning the Internet architecture and (ii) proposing data offloading schemes. In this dissertation, we investigate traffic reduction schemes in two different domains, information-centric networking and information-centric vehicular networks. First, we propose a traffic-reduction content-discovery scheme for information-centric networking (ICN). ICN has been proposed to resolve the problem of current Internet such as traffic explosion by redesigning the Internet architecture in a clean-slate manner. ICN can provide substantial benefits such as network traffic reduction by exploiting a nearby (cached) copy of content and reducing duplicated transmissions for the same content request. However, prior studies usually rely on an opportunistic cache-hit (happen-to-meet) to utilize the cached contents. In the happen-to-meet fashion, only the content cached on the path towards the content source can be utilized, which limits the network-wide usage of the in-network storages. To exploit cached contents better, our proposed scheme SCAN discovers nearby content copies. SCAN exchanges the cached content information among the neighbor routers using Bloom filters for the content discovery. With extensive simulations, SCAN shows better performance than a happen-to-meet cache-hit scheme in terms of average hop counts, traffic volume, and load balancing among links. Next, we propose a traffic offloading scheme for information-centric vehicular network. In wireless environments, the increasing mobile traffic is becoming a serious concern for mobile network providers. To address the traffic explosion problem, there have been a lot of efforts to offload the traffic from cellular networks to other networks, such as WiFi hotspots and femtocells. Our work moves forward from prior studies by focusing on the potential benefits of vehicular networks for data offloading. In particular, we propose a Data Offloading framework using Vehicular nEtworks (DOVE), which reduces the cellular traffic for in-vehicle data services in a cost effective way. DOVE exploits vehicle trajectories for offloading purposes so that content files requested by vehicles can be delivered via vehicular networks rather than cellular networks for economical purposes. We formulate the problem of selecting offloading positions as a spatio-temporal set-covering problem, and propose a time-prediction based set-covering algorithm using vehicle trajectories. Simulation results show that our DOVE framework can significantly reduce 57% of cellular link usage by performing data offloading through vehicular networks.I. Introduction 1 II. Content Discovery for Information-Centric Networking 4 2.1 Introduction 4 2.2 Related Work 7 2.2.1 Named Data Networking (NDN) 7 2.2.2 ICN-based Schemes 8 2.2.3 Approaches using BFs 10 2.3 SCAN Architecture 11 2.3.1 SCAN Description 11 2.3.2 SCAN Operation 16 2.3.3 Discussion 19 2.4 CIB Maintenance in SCAN 21 2.4.1 Information Unit 21 2.4.2 Information Exchange 22 2.4.3 Information Decay 23 2.5 Performance Evaluation 25 2.5.1 Content Discovery Performance 27 2.5.2 Network-wide Performance 28 2.5.3 Effect of Cache Size 30 2.5.4 Effect of Scanning Depth 32 2.5.5 Effect of Information Decay Probability 34 2.5.6 Effect of BF Size 36 2.5.7 Effect of BF Exchange Interval 39 2.5.8 Comparison with ICN-enhancements 39 III. Data Offloading for Information-Centric Vehicular Networks 42 3.1 Introduction 42 3.2 Related Work 44 3.3 Problem Formulation 46 3.3.1 Target Scenario and Goal 46 3.3.2 DOVE Components and Assumptions 46 3.3.3 Design Principles using RNs 49 3.3.4 The Concept of Offloading in DOVE 50 3.4 Design and Operations of DOVE 51 3.4.1 Travel Time Prediction 51 3.4.2 The Operation of TCC 53 3.4.3 The Selection Algorithm for Offloading Positions 54 3.4.4 The Selection of Providers 59 3.4.5 The Operation of Vehicles using Offloading Positions 59 3.5 Performance Evaluation 60 3.5.1 Overall Performance of Data Offloading 61 3.5.2 The Impact of Vehicle Number 67 3.5.3 The Impact of Vehicle Speed 68 3.5.4 The Impact of Waiting Time 70 3.5.5 The Impact of Deployment Ratio and Tolerance Time 71 IV. Conclusion 74 Bibliography 76 Korean Abstract 82Docto

    Named Data Networking in Vehicular Ad hoc Networks: State-of-the-Art and Challenges

    Get PDF
    International audienceInformation-Centric Networking (ICN) has been proposed as one of the future Internet architectures. It is poised to address the challenges faced by today's Internet that include, but not limited to, scalability, addressing, security, and privacy. Furthermore, it also aims at meeting the requirements for new emerging Internet applications. To realize ICN, Named Data Networking (NDN) is one of the recent implementations of ICN that provides a suitable communication approach due to its clean slate design and simple communication model. There are a plethora of applications realized through ICN in different domains where data is the focal point of communication. One such domain is Intelligent Transportation System (ITS) realized through Vehicular Ad hoc NETwork (VANET) where vehicles exchange information and content with each other and with the infrastructure. To date, excellent research results have been yielded in the VANET domain aiming at safe, reliable, and infotainment-rich driving experience. However, due to the dynamic topologies, host-centric model, and ephemeral nature of vehicular communication, various challenges are faced by VANET that hinder the realization of successful vehicular networks and adversely affect the data dissemination, content delivery, and user experiences. To fill these gaps, NDN has been extensively used as underlying communication paradigm for VANET. Inspired by the extensive research results in NDN-based VANET, in this paper, we provide a detailed and systematic review of NDN-driven VANET. More precisely, we investigate the role of NDN in VANET and discuss the feasibility of NDN architecture in VANET environment. Subsequently, we cover in detail, NDN-based naming, routing and forwarding, caching, mobility, and security mechanism for VANET. Furthermore, we discuss the existing standards, solutions, and simulation tools used in NDN-based VANET. Finally, we also identify open challenges and issues faced by NDN-driven VANET and highlight future research directions that should be addressed by the research community

    Prospective use of bloom filter and muxing for information centric network caching

    Get PDF
    Information dissemination as the main objective of setting up the Internet has seen different folds to improve its course.Information centric networking (ICN) has been introduced with the aim of curtailing some future challenges posed at the traditional Internet in the nearest future.ICN advantage of caching chunks of information on-path and off-path of the network stands the paradigm out as an alternative shift from host centric network to name centric.ICN caching approach can thereby significantly reduce amount of times a host is visited.Bloom Filter with its advantage of fast searching and false positivity characteristics are seen as form of message retrieval practice to improve interest serving on the network.This paper analyzed the advantages of vending and adopting Bloom Filters and Muxing as research directions to minimize excessive bandwidth consumption, lesser delays, prompt delivery of information, higher throughput and the ability to share information from troubled stations.Concepts are proposed and wider algorithms are pointed out to increase the overall ICN framework as related to caching and other network services

    A Comparative Analysis of Bloom Filter-based Routing Protocols for Information-Centric Networks

    Get PDF
    Bloom filter-based routing protocols for Named Data Networking (NDN) aim at facilitating content discovery in NDN. In this paper, we compare the performance of two Bloom filter-based routing protocols, namely BFR and COBRA. BFR is a push-based routing protocol that works based on Bloom filter-based content advertisements, while COBRA is a pull-based routing protocol that operates based on route traces left from previously retrieved content objects, which are stored in Stable Bloom Filters. In this paper, we show that BFR outperforms COBRA in terms of average memory needed for storing routing updates, average round-trip delay, normalized communication overhead, total Interest communication overhead, and mean hit distance

    Social Cooperation for Information-Centric Multimedia Streaming in Highway VANETs

    Get PDF
    Abstract-High-quality multimedia streaming services in Vehicular Ad-hoc Networks (VANETs) are severely hindered by intermittent host connectivity issues. The Information Centric Networking (ICN) paradigm could help solving this issue thanks to its new networking primitives driven by content names rather than host addresses. This unique feature, in fact, enables native support to mobility, in-network caching, nomadic networking, multicast, and efficient content dissemination. In this paper, we focus on exploring the potential social cooperation among vehicles in highways. An ICN-based COoperative Caching solution, namely ICoC, is proposed to improve the quality of experience (QoE) of multimedia streaming services. In particular, ICoC leverages two novel social cooperation schemes, namely partner-assisted and courier-assisted, to enhance information-centric caching. To validate its effectiveness, extensive ns-3 simulations have been executed, showing that ICoC achieves a considerable improvement in terms of start-up delay and playback freezing with respect to a state-of-the-art solution based on probabilistic caching
    • โ€ฆ
    corecore