On Sharing an FIB Table in Named Data Networking
"> Figure 1
<p>An example of two Bloom filter union, where the size of the Bloom filters, the number of hash indices, and the used hash functions are identical.</p> "> Figure 2
<p>An example of the proposed scheme. The nodes connected to other networks, <math display="inline"><semantics> <msub> <mi>r</mi> <mn>3</mn> </msub> </semantics></math>, <math display="inline"><semantics> <msub> <mi>r</mi> <mn>6</mn> </msub> </semantics></math>, and <math display="inline"><semantics> <msub> <mi>r</mi> <mn>7</mn> </msub> </semantics></math>, only have the FIB table and the connectivity information is carried in S-BF.</p> "> Figure 3
<p>An example of building an F-BF. A node has <span class="html-italic">n</span> F-BFs, where <span class="html-italic">n</span> is the number of faces, and the F-BF which dedicated for face <span class="html-italic">i</span> is denoted as F-BF[i]. Whenever a new S-BF arrives, the F-BF of the incoming face is updated by bitwise-ORing the incoming S-BF and the existing F-BF.</p> "> Figure 4
<p>An example of F-BFs merging-to reduce the time for querying F-BF[i], where <math display="inline"><semantics> <mrow> <mi>i</mi> <mo>=</mo> <mn>1</mn> <mo>⋯</mo> <mi>n</mi> </mrow> </semantics></math>. F-BFs are merged into one functional Bloom filter [<a href="#B19-applsci-09-03178" class="html-bibr">19</a>,<a href="#B26-applsci-09-03178" class="html-bibr">26</a>].</p> "> Figure 5
<p>Packet handling procedure [<a href="#B5-applsci-09-03178" class="html-bibr">5</a>], where the upper part illustrates the <span class="html-italic">Interest</span> packet handling procedure and the lower part describes the <span class="html-italic">Data</span> packet handling procedure.</p> "> Figure 6
<p>The average number of hop count under the various sizes of Bloom filters. As the size of Bloom filters grows, the data retrieval is performed along the optimal path.</p> "> Figure 7
<p>The number of <span class="html-italic">Interest</span> packets under the various sizes of Bloom filters. As the size of the Bloom filters gets larger, the number of multicasts decreases.</p> "> Figure 7 Cont.
<p>The number of <span class="html-italic">Interest</span> packets under the various sizes of Bloom filters. As the size of the Bloom filters gets larger, the number of multicasts decreases.</p> "> Figure 8
<p>Memory requirements based on Equation (<a href="#FD4-applsci-09-03178" class="html-disp-formula">4</a>) and (<a href="#FD5-applsci-09-03178" class="html-disp-formula">5</a>). As the size of the Bloom filter grows, the memory requirement for the Bloom filter naturally increases, but the number of auxiliary FIB entries decreases. In all topologies, the memory usages are minimal when the size of the Bloom filter is 2048 bits.</p> "> Figure 9
<p>Comparison in average hop count. The proposed scheme can achieve the near optimal packet delivery in all four topologies.</p> "> Figure 10
<p>Comparison in the normalized number of <span class="html-italic">Interest</span> packets. The proposed scheme uses only about 1% more <span class="html-italic">Interest</span> packets than the <span class="html-italic">shortest path</span>, while simple <span class="html-italic">flooding</span> consumes up to almost twice the number of <span class="html-italic">Interest</span> packets.</p> "> Figure 11
<p>Comparison in memory consumption (<math display="inline"><semantics> <mrow> <mi>M</mi> <mi>e</mi> <msub> <mi>m</mi> <mn>2</mn> </msub> </mrow> </semantics></math>). The proposed work consumes only 5–9% of the memory consumed by the <span class="html-italic">shortest path</span>, of which routers have the complete knowledge of all name prefixes.</p> "> Figure 12
<p>Comparison in traffic for routing (MB). The traffic used for the proposed work is much smaller than <span class="html-italic">shortest path</span>, which is about 6–8% of the traffic of the <span class="html-italic">shortest path</span>.</p> ">
Abstract
:1. Introduction
- We propose a novel method which combines the routing of network connectivity and the building of a forwarding engine using Bloom filters, while previous works focus on either the routing or the forwarding using Bloom filters. Since the Bloom filters used in the routing phase are also used for forwarding, the construction of forwarding engines is simplified to the union of Bloom filters.
- We also provide a method to reduce the impact of false positives, which is inevitable when using Bloom filters.
- Large scale simulations were conducted using four real topologies which have up to 279 nodes. One thousand consumers and producers were randomly allocated on the network topologies, equivalent to a network with up to 2279 nodes.
- The performance evaluation shows that the proposed scheme significantly reduces the network traffic for routing and the memory consumption for storing name prefixes in a forwarding engine.
2. Related Works
2.1. Routing in Named Data Networking
2.2. Forwarding in Named Data Networking
2.3. Bloom Filter
3. Proposed Work
3.1. Sharing Connectivity Information
Algorithm 1: Procedure for receiving Bloom filters. |
3.2. Packet Forwarding Procedure
Algorithm 2: Procedure for querying F-BFs. |
Algorithm 3: Procedure for forwarding Interest packets. |
Algorithm 4: Procedure on handling Data packets. |
4. Performance Evaluation
4.1. Performance Metrics
4.2. Performance of Proposed Work
4.3. Performance Comparison with Other Schemes
5. Conclusions
Author Contributions
Funding
Conflicts of Interest
References
- Cisco Visual Networking Index: Forecast and Methodology, 2016–2021; Cisco: San Jose, CA, USA, 2017.
- Jacobson, V.; Smetters, D.K.; Thornton, J.D.; Plass, M.F.; Briggs, N.H.; Braynard, R.L. Networking Named Content. In Proceedings of the 5th International Conference on Emerging Networking Experiments and Technologies (CoNEXT ’09), Rome, Italy, 1–4 December 2009. [Google Scholar]
- Liang, Y.; Chen, Z.; Li, J.; Ding, S. Reality Check of CCN Routing Using Search Processor. In Proceedings of the 2012 Third International Conference on Networking and Distributed Computing, Hangzhou, China, 21–24 October 2012; pp. 16–20. [Google Scholar]
- Mun, J.; Lim, H. Cache sharing using Bloom filters in named data networking. J. Netw. Comput. Appl. 2017, 90, 74–82. [Google Scholar] [CrossRef]
- Yi, C.; Afanasyev, A.; Moiseenko, I.; Wang, L.; Zhang, B.; Zhang, L. A case for stateful forwarding plane. Comput. Commun. 2013, 36, 779–791. [Google Scholar] [CrossRef] [Green Version]
- Choi, H.; Yoo, J.; Chung, T.; Choi, N.; Kwon, T.; Choi, Y. CoRC: Coordinated routing and caching for named data networking. In Proceedings of the Tenth ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS ’14), Los Angeles, CA, USA, 20–21 October 2014; ACM: New York, NY, USA, 2014; pp. 161–172. [Google Scholar]
- Yi, C.; Abraham, J.; Afanasyev, A.; Wang, L.; Zhang, B.; Zhang, L. On the role of routing in named data networking. In Proceedings of the 1st ACM Conference on Information-Centric Networking (ACM-ICN ’14), Paris, France, 24–26 September 2014; ACM: New York, NY, USA, 2014. [Google Scholar]
- Hoque, A.K.M.M.; Amin, S.O.; Alyyan, A.; Zhang, B.; Zhang, L.; Wang, L. NLSR: Named-data link state routing protocol. In Proceedings of the 3rd ACM SIGCOMM Workshop on Information-Centric Networking (ICN ’13), Hong Kong, China, 12 August 2013; ACM: New York, NY, USA, 2013; pp. 15–20. [Google Scholar]
- Lehman, V.; Gawande, A.; Zhang, B.; Zhang, L.; Aldecoa, R.; Krioukov, D.; Wang, L. An experimental investigation of hyperbolic routing with a smart forwarding plane in NDN. In Proceedings of the IEEE/ACM 24th International Symposium on Quality of Service (IWQoS), Beijing, China, 24–25 June 2016; pp. 1–10. [Google Scholar]
- DiBenedetto, S.; Papadopoulos, C.; Massey, D. Routing policies in named data networking. In Proceedings of the ACM SIGCOMM Workshop on Information-Centric Networking (ICN ’11), Toronto, ON, Canada, 19 August 2011; pp. 38–43. [Google Scholar]
- Ahmed, R.; Bari, M.F.; Chowdhury, S.R.; Rabbani, M.G.; Boutaba, R.; Mathieu, B. αRoute: A name based routing scheme for Information Centric Networks. In Proceedings of the IEEE INFOCOM, Turin, Italy, 14 April 2013; pp. 90–94. [Google Scholar]
- Eum, S.; Nakauchi, K.; Murata, M.; Shoji, Y.; Nishinaga, N. Potential based routing as a secondary best-effort routing for Information Centric Networking (ICN). Comput. Netw. 2013, 57, 3154–3164. [Google Scholar] [CrossRef]
- Marandi, A.; Braun, T.; Salamatian, K.; Thomos, N. BFR: A bloom filter-based routing approach for information-centric networks. In Proceedings of the IFIP Networking Conference (IFIP Networking) and Workshops, Stockholm, Sweden, 23 June 2017; pp. 1–9. [Google Scholar]
- Lee, J.; Shim, M.; Lim, H. Name Prefix Matching Using Bloom Filter Pre-Searching for Content Centric Network. J. Netw. Comput. Appl. 2016, 65, 36–47. [Google Scholar] [CrossRef]
- Seo, J.; Lim, H. Bitmap-based Priority-NPT for Packet Forwarding at Named Data Network. Comput. Commun. 2018, 130, 101–112. [Google Scholar] [CrossRef]
- So, W.; Narayanan, A.; Oran, D. Named data networking on a router: fast and dos-resistant forwarding with hash tables. In Proceedings of the Ninth ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS ’13), San Jose, CA, USA, 21–22 October 2013; pp. 215–225. [Google Scholar]
- Lee, H.; Nakao, A. Improving Bloom Filter Forwarding Architectures. IEEE Commun. Lett. 2014, 18, 1715–1718. [Google Scholar] [CrossRef]
- Quan, W.; Xu, C.; Guan, J.; Zhang, H.; Grieco, L.A. Scalable Name Lookup with Adaptive Prefix Bloom Filter for Named Data Networking. Comput. Netw. 2014, 18, 102–105. [Google Scholar] [CrossRef]
- Wang, Y.; Pan, T.; Mi, Z.; Dai, H.; Guo, X.; Zhang, T.; Liu, B.; Dong, Q. NameFilter: Achieving fast name lookup with low memory cost via applying two-stage Bloom filters. In Proceedings of the IEEE INFOCOM, Turin, Italy, 14 April 2013; pp. 95–99. [Google Scholar]
- Dharmapurikar, S.; Krishnamurthy, P.; Taylor, D. Longest prefix matching using Bloom filters. IEEE/ACM Trans. Netw. 2006, 14, 397–409. [Google Scholar] [CrossRef]
- Bloom, B. Space/time trade-offs in in hash coding with allowable errors. Commun. ACM 1970, 13, 422–426. [Google Scholar] [CrossRef]
- Tarkoma, S.; Rothenberg, C.E.; Lagerspetz, E. Theory and Practice of Bloom Filters for Distributed Systems. IEEE Commun. Surv. Tutor. 2012, 14, 131–155. [Google Scholar] [CrossRef]
- Broder, A.Z.; Mitzenmacher, M. Network Applications of Bloom Filters: A Survey. Internet Math. 2004, 1, 485–509. [Google Scholar] [CrossRef] [Green Version]
- Fan, L.; Cao, P.; Almeida, J.; Broder, A.Z. Summary cache: a scalable wide-area Web cache sharing protocol. In Proceedings of the ACM SIGCOMM ’98 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication (SIGCOMM ’98), Vancouver, BC, Canada, 31 August–4 September 1998; ACM: New York, NY, USA, 1998; pp. 254–265. [Google Scholar]
- Yang, T.; Liu, A.X.; Shahzad, M.; Zhong, Y.; Fu, Q.; Li, Z.; Xie, G.; Li, X. A shifting bloom filter framework for set queries. Proc. VLDB Endow. 2016, 9, 408–419. [Google Scholar] [CrossRef]
- Bonomi, F.; Mitzenmacher, M.; Panigrah, R.; Singh, S.; Varghese, G. Beyond Bloom filters: From approximate membership checks to approximate state machines. In Proceedings of the 2006 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM ’06 ), Pisa, Italy, 11–15 September 2006; pp. 315–326. [Google Scholar]
- Sisi, X.; Yanjun, Y.; Qing, C.; Tian, H. kBF: A Bloom Filter for key-value storage with an application on approximate state machines. In Proceedings of the IEEE INFOCOM, Toronto, ON, Canada, 27 April–2 May 2014; pp. 1150–1158. [Google Scholar]
- Spring, N.; Mahajan, R.; Wetherall, D. Measuring ISP topologies with rocketfuel. In Proceedings of the 2002 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM ’02), Pittsburgh, PA, USA, 19–23 August 2002; pp. 133–145. [Google Scholar]
- Alexa the Web Information Company. Available online: http://www.alexa.com (accessed on 5 August 2019).
- Breslau, L.; Cao, P.; Fan, L.; Phillips, G.; Shenker, S. Web Caching and Zipf-like Distributions: Evidence and Implications. In Proceedings of the IEEE INFOCOM, New York, NY, USA, 21–25 March 1999; pp. 126–134. [Google Scholar]
AS | Name | Total Nodes | Backbone | Gateway | Leaf | Links |
---|---|---|---|---|---|---|
1755 | Ebone | 163 | 23 | 68 | 72 | 366 |
6461 | Abovenet | 176 | 13 | 33 | 130 | 289 |
3936 | Exodus | 192 | 39 | 58 | 95 | 422 |
1221 | Telstra | 279 | 65 | 45 | 169 | 731 |
Shortest Path | Flooding | The Proposed | |
---|---|---|---|
Number of FIB entries | 162,000 | 126,798 | 8769 |
Number of total characters | 7,943,346 | 6,218,337 | 438,261 |
Number of Bloom filters | - | - | 370 |
Memory using Equation (4) (MB) | 7.73 | 5.89 | 0.52 |
Ratio | 1 | 0.76 | 0.07 |
Memory using Equation (5) (MB) | 2.63 | 2.01 | 0.23 |
Ratio | 1 | 0.76 | 0.09 |
Shortest Path | Flooding | The Proposed | |
---|---|---|---|
Number of FIB entries | 175,000 | 75,394 | 6133 |
Number of total characters | 8,580,775 | 3,694,688 | 308,835 |
Number of Bloom filters | - | - | 327 |
Memory using Equation (4) (MB) | 8.35 | 3.60 | 0.38 |
Ratio | 1 | 0.43 | 0.05 |
Memory using Equation (5) (MB) | 2.83 | 1.22 | 0.17 |
Ratio | 1 | 0.43 | 0.06 |
© 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Mun, J.H.; Lim, H. On Sharing an FIB Table in Named Data Networking. Appl. Sci. 2019, 9, 3178. https://doi.org/10.3390/app9153178
Mun JH, Lim H. On Sharing an FIB Table in Named Data Networking. Applied Sciences. 2019; 9(15):3178. https://doi.org/10.3390/app9153178
Chicago/Turabian StyleMun, Ju Hyoung, and Hyesook Lim. 2019. "On Sharing an FIB Table in Named Data Networking" Applied Sciences 9, no. 15: 3178. https://doi.org/10.3390/app9153178
APA StyleMun, J. H., & Lim, H. (2019). On Sharing an FIB Table in Named Data Networking. Applied Sciences, 9(15), 3178. https://doi.org/10.3390/app9153178