[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/2836183.2836187acmotherconferencesArticle/Chapter ViewAbstractPublication PagescommConference Proceedingsconference-collections
research-article

Enhancing multi-source content delivery in content-centric networks with fountain coding

Published: 01 December 2016 Publication History

Abstract

Fountain coding has been considered as especially suitable for lossy environments, such as wireless networks, as it provides redundancy while reducing coordination overheads between sender(s) and receiver(s). As such it presents beneficial properties for multi-source and/or multicast communication. In this paper we investigate enhancing the efficiency of multi-source content delivery in the context of Content-Centric Networking (CCN) with the usage of fountain codes. In particular, we examine whether the combination of fountain coding with the in-network caching capabilities of CCN can further improve performance. We also present an enhancement of CCN's Interest forwarding mechanism that aims at minimizing duplicate transmissions that may occur in a multi-source transmission scenario, where all available content providers and caches with matching (cached) content transmit data packets simultaneously. Our simulations indicate that the use of fountain coding in CCN is a valid approach that further increases network performance compared to traditional schemes.

References

[1]
B. H. Bloom. Space/Time Trade-offs in Hash Coding with Allowable Errors. Commun. ACM, 1970.
[2]
J. W. Byers, J. Considine, M. Mitzenmacher, and S. Rost. Informed content delivery across adaptive overlay networks. In ACM SIGCOMM, 2002.
[3]
J. W. Byers, M. Luby, M. Mitzenmacher, and A. Rege. A digital fountain approach to reliable distribution of bulk data. In ACM SIGCOMM, 1998.
[4]
G. Carofiglio, M. Gallo, L. Muscariello, and D. Perino. Modeling data transfer in content-centric networking. In ITC, 2011.
[5]
W. K. Chai, D. He, I. Psaras, and G. Pavlou. Cache "less for more" in information-centric networks (extended version). Computer Communications, 2013.
[6]
A. G. Dimakis, P. B. Godfrey, Y. Wu, M. J. Wainwright, and K. Ramchandran. Network coding for distributed storage systems. Information Theory, IEEE Transactions on, 2010.
[7]
A. G. Dimakis, V. Prabhakaran, and K. Ramchandran. Ubiquitous Access to Distributed Data in Large-scale Sensor Networks Through Decentralized Erasure Codes. In IPSN, 2005.
[8]
A. G. Dimakis, V. Prabhakaran, and K. Ramchandran. Decentralized erasure codes for distributed networked storage. IEEE/ACM Transactions on Networking (TON), 2006.
[9]
A. G. Dimakis, V. Prabhakaran, and K. Ramchandran. Distributed fountain codes for networked storage. In IEEE ICASSP, 2006.
[10]
C. Gkantsidis and P. R. Rodriguez. Network coding for large scale content distribution. In IEEE INFOCOM, 2005.
[11]
A. Ioannou and S. Weber. Towards on-path caching alternatives in Information-Centric Networks. In IEEE Conference on Local Computer Networks, LCN, 2014.
[12]
V. Jacobson, D. K. Smetters, J. D. Thornton, M. F. Plass, N. H. Briggs, and R. L. Braynard. Networking Named Content. In ACM CoNEXT, 2009.
[13]
M. Luby. LT Codes. In Symposium on Foundations of Computer Science, 2002.
[14]
M. Luby, A. Shokrollahi, M. Watson, and T. Stockhammer. RFC 5053 - Raptor Forward Error Correction Scheme for Object Delivery. Technical report.
[15]
S. McCanne, V. Jacobson, and M. Vetterli. Receiver-driven Layered Multicast. SIGCOMM Comput. Commun. Rev., 1996.
[16]
G. Parisis, T. Moncaster, A. Madhavapeddy, and J. Crowcroft. Trevi: Watering Down Storage Hotspots with Cool Fountain Codes. In ACM HotNets, 2013.
[17]
G. Parisis and D. Trossen. Filling the Gaps of Unused Capacity Through a Fountain Coded Dissemination of Information. SIGMOBILE Mob. Comput. Commun. Rev., 2014.
[18]
I. Psaras, W. K. Chai, and G. Pavlou. In-Network Cache Management and Resource Allocation for Information-Centric Networks. IEEE TPDS, 2014.
[19]
A. Shokrollahi. Raptor codes. Information Theory, IEEE Trans. on, 2006.
[20]
V. Sourlas, L. Tassiulas, I. Psaras, and G. Pavlou. Information Resilience through User-Assisted Caching in Disruptive Content-Centric Networks. In IFIP NETWORKING, 2015.
[21]
Y. Sun, S. K. Fayaz, Y. Guo, V. Sekar, Y. Jin, M. A. Kaafar, and S. Uhlig. Trace-Driven Analysis of ICN Caching Algorithms on Video-on-Demand Workloads. In ACM CoNEXT, 2014.
[22]
C. Tsilopoulos and G. Xylomenos. Supporting Diverse Traffic Types in Information Centric Networks. In ACM SIGCOMM Workshop on ICN, 2011.
[23]
G. Xylomenos, C. N. Ververidis, V. Siris, N. Fotiou, C. Tsilopoulos, X. Vasilakos, K. V. Katsaros, and G. C. Polyzos. A survey of information-centric networking research. Communications Surveys & Tutorials, IEEE, 2014.

Cited By

View all
  • (2022)Optimized in-network authentication against pollution attacks in software-defined-named data networkingJournal of Information Security and Applications10.1016/j.jisa.2019.10240950:COnline publication date: 21-Apr-2022

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
CCDWN '16: Proceedings of the 1st Workshop on Content Caching and Delivery in Wireless Networks
December 2016
58 pages
ISBN:9781450340540
DOI:10.1145/2836183
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 December 2016

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. fountain coding
  2. in-network caching
  3. information-centric networks
  4. multi-source content delivery

Qualifiers

  • Research-article

Conference

CoNEXT '15

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 18 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2022)Optimized in-network authentication against pollution attacks in software-defined-named data networkingJournal of Information Security and Applications10.1016/j.jisa.2019.10240950:COnline publication date: 21-Apr-2022

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media