The Two-Armed Bernoulli Bandit (TABB) problem is an orthodox optimization dilemma in reinforcement learning discipline where a decision-maker or agent is repeatedly faced with a choice of two actions (options). Every time the agent selects an action, it receives a corresponding payoff from an unknown distribution. Thus, the agent must trade-off between exploration of new better action and exploitation of current best action. Content retrieval in Named Data Networks (NDN) commences with a consumer requesting the desired content by sending an Interest that hits multiple content sources over different paths. As the corresponding Interest arrives, the content sources respond by replying the matching Data to the requester. In this work, Data replying problem in NDN is considered a TABB problem, denoted as DTABB. Since numerous sources are available, a content source in DTABB can choose between responding with entire content and partial content once the corresponding Interest strikes. The best source is trained to answer with complete data, while other (sub-optimal) sources learn to react with partial (or payload-free) data. The proposed strategy is formulated from a source’s viewpoint, which uses four prominent reinforcement learning algorithms: greedy, ε-greedy, Upper Confidence Bound (UCB1), and Gradient Bandit to select the optimal action. Eventually, the network picture converges to a point where a single source is exploited for whole data while others send only partial data. Thus, DTABB can substantially reduce the transmission overhead and enjoy a better user experience in terms of delay. DTABB is implemented in ndnSIM, which reveals that the proposed solution can reduce the communication overhead by up to 40% compared to the default strategy.
This is a preview of subscription content, access via your institution.
Buy single article
Instant access to the full article PDF.
Price includes VAT (USA)
Tax calculation will be finalised during checkout.
Available on-request or on-demand.
Zhang, L., et al.: Named data networking. Comput. Commun. Rev. 44(3), 66–73 (2014). https://doi.org/10.1145/2656877.2656887
Cheriton, D.R., Gritter, M.: TRIAD: a new next-generation Internet architecture. http://www-dsg.stanford.edu/triad/. January 2000, pp. 1–20. http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.33.5878. Accessed 27 Mar 2020
Koponen, T., et al.: A data-oriented (and beyond) network architecture. Comput. Commun. Rev. 37(4), 181–192 (2007). https://doi.org/10.1145/1282427.1282402
Jacobson, V., Smetters, D.K., Thornton, J.D., Plass, M.F., Briggs, N.H., Braynard, R.L.: Networking named content. In: CoNEXT’09—Proceedings of the 2009 ACM Conference on Emerging Networking Experiments and Technologies, pp. 1–12 (2009). https://doi.org/10.1145/1658939.1658941
Zhang, L.: Named Data Networking (NDN) project—PARC. PARC TR-2010-3, October 2010. https://www.parc.com/technical-publications/named-data-networking-ndn-project. Accessed 27 Mar 2020
Lv, J., Tan, X., Jin, Y., Zhu, J.: DRL-based forwarding strategy in named data networking. In: Chinese Control Conference (CCC), October 2018, vol. 2018–July, pp. 6493–6498, https://doi.org/10.23919/ChiCC.2018.8483989.
Granmo, O.C.: Solving two-armed Bernoulli bandit problems using a Bayesian learning automaton. Int. J. Intell. Comput. Cybern. 3(2), 207–234 (2010). https://doi.org/10.1108/17563781011049179
Kelley, T.A.: A note on the Bernoulli two-armed bandit problem. Ann. Stat. 2(5), 1056–1062 (1974). https://doi.org/10.1214/aos/1176342827
Cover, T.M.: A note on the two-armed bandit problem with finite memory. Inf. Control 12(5), 371–377 (1968). https://doi.org/10.1016/S0019-9958(68)90382-3
Iqbal, S.M.A.: Asaduzzaman: Adaptive forwarding strategies to reduce redundant interests and data in named data networks. J. Netw. Comput. Appl. 106, 33–47 (2018). https://doi.org/10.1016/j.jnca.2018.01.013
Mastorakis, S., Afanasyev, A., Moiseenko, I., Zhang, L.: ndnSIM 2: an updated NDN simulator for NS-3 (2016). https://named-data.net/wp-content/uploads/2016/11/ndn-0028-2-ndnsim-v2.pdf
Wang, L., Bayhan, S., Ott, J., Kangasharju, J., Sathiaseelan, A., Crowcroft, J.: Pro-diluvian: understanding scoped-flooding for content discovery in information-centric networking. In: ICN 2015—Proceedings of the 2nd International Conference on Information-Centric Networking, September 2015, pp. 9–18. https://doi.org/10.1145/2810156.2810162.
Badov, M., Seetharam, A., Kurose, J., Firoiu, V., Nanda, S.: Congestion-aware caching and search in information-centric networks. In: ICN 2014—Proceedings of the 1st International Conference on Information-Centric Networking, September 2014, pp. 37–46. https://doi.org/10.1145/2660129.2660145.
Rossini, G., Rossi, D.: Coupling caching and forwarding. In: Proceedings of the 1st International Conference on Information-Centric Networking—INC ’14, pp. 127–136 (2014). https://doi.org/10.1145/2660129.2660153
Ascigil, O., Sourlas, V., Psaras, I., Pavlou, G.: Opportunistic off-path content discovery in information-centric networks. In: IEEE Workshop on Local and Metropolitan Area Networks, August 2016, vol. 2016. https://doi.org/10.1109/LANMAN.2016.7548860
Amadeo, M., Molinaro, A., Ruggeri, G.: E-CHANET: routing, forwarding and transport in information-centric multihop wireless networks. Comput. Commun. 36(7), 792–803 (2013). https://doi.org/10.1016/j.comcom.2013.01.006
Sutton, R.S., Barto, A.G.: Reinforcement learning, 2nd edn. The MIT Press, London (2015)
Morales, E.F., Zaragoza, J.H.: An introduction to reinforcement learning. In: Decision Theory Models for Applications in Artificial Intelligence: Concepts and Solutions, pp. 63–80. IGI Global, Hershey (2011). https://doi.org/10.4018/978-1-60960-165-2.ch004.
Avrachenkov, K., Jacko, P.: CCN interest forwarding strategy as Multi-Armed Bandit model with delays. In: NetGCoop 2012—6th International Conference on Network Games, Control and Optimization, pp. 38–43 (2012). https://ieeexplore.ieee.org/document/6486116. Accessed 18 Aug 2020
Carofiglio, G., Gallo, M., Muscariello, L.: Optimal multipath congestion control and request forwarding in information-centric networks: protocol design and experimentation. Comput. Netw. 110, 104–117 (2016). https://doi.org/10.1016/j.comnet.2016.09.012
Udugama, A., Zhang, X., Kuladinithi, K., Goerg, C.: An on-demand multi-path interest forwarding strategy for content retrievals in CCN. In: IEEE Network Operations and Management Symposium (NOMS) (2014). https://doi.org/10.1109/NOMS.2014.6838389
Khan, A.Z., Baqai, S., Dogar, F.R.: QoS aware path selection in content centric networks. In: IEEE International Conference on Communications, pp. 2645–2649 (2012). https://doi.org/10.1109/ICC.2012.6363829.
Qian, H., Ravindran, R., Wang, G.Q., Medhi, D.: Probability-based adaptive forwarding strategy in named data networking. In: Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), pp. 1094–1101 (2013). https://www.researchgate.net/publication/261399057_Probability-based_adaptive_forwarding_strategy_in_named_data_networking. Accessed 22 Aug 2020.
Yi, C., Afanasyev, A., Moiseenko, I., Wang, L., Zhang, B., Zhang, L.: A case for stateful forwarding plane. Comput. Commun. 36(7), 779–791 (2013). https://doi.org/10.1016/j.comcom.2013.01.005
Zhang, Y., Xu, K., Bai, B., Lei, K.: IFS-RL: an intelligent forwarding strategy based on reinforcement learning in named-data networking. In: NetAI 2018—Proceedings of the 2018 Workshop on Network Meets AI and ML, Part of SIGCOMM 2018, pp. 54–59 (2018). https://doi.org/10.1145/3229543.3229547
Kerrouche, A., Senouci, M.R., Mellouk, A.: QoS-FS: a new forwarding strategy with QoS for routing in Named Data Networking. In: IEEE International Conference on Communications (ICC) 2016. https://doi.org/10.1109/ICC.2016.7511378
Akinwande, O.: A reinforcement learning approach to adaptive forwarding in named data networking. In: 32nd International Symposium, ISCIS 2018, held at the 24th IFIP a Reinforcement Learning Approach to Adaptive Forwarding in Named Data Networking, November 2019 (2018). https://doi.org/10.1007/978-3-030-00840-6
Lei, K., Wang, J., Yuan, J.: An entropy-based probabilistic forwarding strategy in named data networking. In: IEEE International Conference on Communications, September 2015, vol. 2015, pp. 5665–5671. https://doi.org/10.1109/ICC.2015.7249225
Fu, B., Qian, L., Zhu, Y., Wang, L.: Reinforcement learning-based algorithm for efficient and adaptive forwarding in named data networking. In: 2017 IEEE/CIC International Conference on Communications in China, ICCC 2017, April 2018, vol. 2018–January, pp. 1–6. https://doi.org/10.1109/ICCChina.2017.8330354
Bastos, I.V., Moraes, I.M.: A diversity-based search-and-routing approach for named-data networking. Comput. Netw. 157, 11–23 (2019). https://doi.org/10.1016/j.comnet.2019.04.003
Zhang, M., Wang, X., Liu, T., Zhu, J., Wu, Q.: AFSndn: a novel adaptive forwarding strategy in named data networking based on Q-learning. Peer-to-Peer Netw. Appl. 13(4), 1176–1184 (2020). https://doi.org/10.1007/s12083-019-00845-w
Akinwande, O.: Interest forwarding in named data networking using reinforcement learning. Sensors (Switzerland) (2018). https://doi.org/10.3390/s18103354
Chiocchetti, R., Perino, D., Carofiglio, G., Rossi, D., Rossini, G.: INFORM: a dynamic interest forwarding mechanism for information centric networking. In: ICN 2013—Proceedings of the 3rd 2013 ACM SIGCOMM Workshop on Information-Centric Networking, pp. 9–14 (2013). https://doi.org/10.1145/2491224.2491227
Yao, J., Yin, B., Tan, X.: A SMDP-based forwarding scheme in named data networking. Neurocomputing 306, 213–225 (2018). https://doi.org/10.1016/j.neucom.2018.03.057
Yao, J., Yin, B., Lu, X.: A novel joint adaptive forwarding and resource allocation strategy for named data networking based on SMDP. In: A novel joint adaptive forwarding and resource allocation strategy for named data networking based on SMDP (2016)
Bastos, I.V., Moraes, I.M.: A forwarding strategy based on reinforcement learning for content-centric networking. In: International Conference on the Network of the Future (NOF) (2017). https://doi.org/10.1109/NOF.2016.7810121
Lan, D., Tan, X., Lv, L., Jin, Y., Yang, J.: A deep reinforcement learning based congestion control mechanism for NDN. In: ICC 2019—2019 IEEE International Conference on Communications, pp. 1–7 (2019)
Qiu, S., Tan, X., Zhu, J.: Dynamic adaptive streaming control based on deep reinforcement learning in named data networking. In: 2018 37th Chinese Control Conference, pp. 9478–9482 (2018)
Liu, T., Zhang, M., Zhu, J., Zheng, R., Liu, R., Wu, Q.: ACCP: adaptive congestion control protocol in named data networking based on deep learning. Neural Comput. Appl. 31(9), 4675–4683 (2019). https://doi.org/10.1007/s00521-018-3408-2
Kumar, N., Singh, A.K., Srivastava, S.: Feature selection for interest flooding attack in named data networking. Int. J. Comput. Appl. (2019). https://doi.org/10.1080/1206212X.2019.1583820
Muscariello, L.: Supervised machine learning-based routing for named data networking. In: IEEE Conference and Exhibition on Global Telecommunications (GLOBECOM)
Gong, L., Wang, J., Zhang, X., Lei, K.: Intelligent forwarding strategy based on online machine learning in named data networking. In: IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), December 2018, pp. 1288–1294 (2016). https://doi.org/10.1109/TrustCom.2016.0206
Ghali, C., Narayanan, A., Oran, D., Tsudik, G., Wood, C.A.: Secure fragmentation for content-centric networks (extended version) (2014). http://arxiv.org/abs/1405.2861
Afanasyev, A., Shi, J., Wang, L., Zhang, B., Zhang, L.: Packet fragmentation in NDN: why NDN uses hop-by-hop fragmentation. NDN, NDN Memo, Tech. Rep. NDN-0032, pp. 1–5 (2015). http://named-data.net/techreports.html
Hoeffding, W.: Probability inequalities for sums of bounded random variables. J. Am. Stat. Assoc. 58(301), 13 (1963). https://doi.org/10.2307/2282952
Afanasyev, A., Moiseenko, I., Zhang, L.: ndnSIM: NS-3 based Named Data Networking (NDN) simulator. http://ndnsim.net/2.7/, NDN Technical Report NDN-0005 (2012). https://named-data.net/publications/techreports/trndnsim/. Accessed 27 Mar 2020.
Ioannou, A., Weber, S.: A survey of caching policies and forwarding mechanisms in information-centric networking. IEEE Commun. Surveys Tutor 18(4), 2847–2886 (2016). https://doi.org/10.1109/COMST.2016.2565541
Prodhan, A.T., Das, R., Kabir, H., Shoja, G.C.: TTL based routing in opportunistic networks. J. Netw. Comput. Appl. 34(5), 1660–1670 (2011). https://doi.org/10.1016/j.jnca.2011.05.005
Medina, A., Matta, I., Byers, J.: BRITE: A Flexible Generator of Internet Topologies|Guide books (2000). Accessed 27 Mar 2020
Statistical tools for describing experimental data. In: Scientific Methods in Mobile Robotics, pp. 29–84. Springer, London (2006)
No funds, grants, or other support was received.
Conflict of interest
The authors have no relevant financial or non-financial interests to disclose.
The work is a novel work and has not been published elsewhere nor is it currently under review for publication elsewhere.
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
About this article
Cite this article
Iqbal, S.M.A., Asaduzzaman & Hoque, M.M. A source-driven reinforcement learning-based Data reply strategy to reduce communication overhead in Named Data Networks (NDN). Cluster Comput (2021). https://doi.org/10.1007/s10586-021-03443-9
- Transmission overhead
- Selection probability
- Content payload