Advertisement

The Resource Efficient Forwarding in the Content Centric Network

  • Yifan Yu
  • Daqing Gu
Part of the Lecture Notes in Computer Science book series (LNCS, volume 6640)

Abstract

Today’s networking technologies in Internet that can only speak of connections between hosts no longer adapt to the network increasingly dominated by content distribution and retrieval. Some efforts therefore have been made to generalize the Internet architecture by taking content as a primitive- decoupling location in the network instead of focusing on endpoint addresses of hosts. However, one of the representative architectures known as Content-Centric Networking (CCN) consumes excessive system resource in terms of router’s processing capability, the buffer space in the router and the network bandwidth when deployed as the ”universal overlay” in the existing network. We present the solution composed of two methods to improve the resource efficiency based on the CCN approach. The results from the ns2-based simulation disclose that our solution can reduce the resource consumption in routers and network pipeline significantly in the overlay architecture.

Keywords

Content-Centric Networking Internet architecture Forwarding Resource efficient Data 

References

  1. 1.
    Comer, D.E.: Internetworking with TCP/IP. In: Principles, Protocols, and Architecture, 4th edn., vol. 1. Prentice Hall, Englewood Cliffs (2000)Google Scholar
  2. 2.
    Named Data Networking (NDN) Project, http://www.named-data.net
  3. 3.
    Tanenbaum, A.S.: Computer Networks. Prentice-Hall, Englewood Cliffs (2002)Google Scholar
  4. 4.
    AKARI, New Generation Network Architecture AKARI Conceptual Design. Project Description v1.1 (2008)Google Scholar
  5. 5.
    Gluhak, A., Bauer, M., Montagut, F., Stirbu, V., Johansson, M., Vercher, J., Presser, M.: Towards an Architecture for a Real World Internet. In: Towards the Future Internet. IOS Press, Amsterdam (2009)Google Scholar
  6. 6.
    Jacobson, V., Smetters, D.K., Thornton, J.D., Plass, M.F., Briggs, N.H., Braynard, R.L.: Networking Named Content. In: The 5th International Conference on Emerging Networking Experiments and Technologies, pp. 1–12. ACM, New York (2009)CrossRefGoogle Scholar
  7. 7.
    Zhu, Y., Chen, M., Nakao, A.: CONIC: Content-Oriented Network with Indexed Caching. In: INFOCOM IEEE Conference on Computer Communications Workshops, pp. 1–6. IEEE Press, New York (2010)CrossRefGoogle Scholar
  8. 8.
    Koponen, T., Chawla, M., Chun, B.-G., Ermolinskiy, A., Kim, K.H., Shenker, S., Stoica, I.: A data-oriented (and beyond) network architecture. In: The 2007 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, pp. 181–192. ACM, New York (2007)Google Scholar
  9. 9.
    Jokela, P., Zahemszky, A., Rothenberg, C.E., Arianfar, S., Nikander, P.: LIPSIN: Line speeds publish/subscribe inter-networking. In: The ACM SIGCOMM 2009 Conference on Data Communication, pp. 195–206. ACM, New York (2009)CrossRefGoogle Scholar
  10. 10.
    Ambrosio, M.D., Marchisio, M., Vercellone, V., et al.: Second NetInf Architecture Description, 4WARD Deliverable D6.2 (January 2010)Google Scholar
  11. 11.
    Freedman, M.: Building a service-centric network with SCAFFOLD Princeton University (2010)Google Scholar
  12. 12.
    Ahmed, R., Boutaba, R.: Distributed pattern matching: a key to flexible and efficient P2P search. IEEE Journal on Selected Areas in Communications 25, 73–83 (2007)CrossRefGoogle Scholar
  13. 13.
    Ahmed, R., Boutaba, R.: Plexus: a scalable peer-to-peer protocol enabling efficient subset search. IEEE/ACM Transactions on Networking 17, 130–143 (2009)CrossRefGoogle Scholar
  14. 14.
    Moskowitz, R., Nikander, P.: Host Identity Protocol Architecture. RFC 4423, IETF (2006)Google Scholar
  15. 15.
    Trossen, D., Sarela, M., Sollins, K.: Arguments for an information-centric internetworking architecture. SIGCOMM Comput. Commun. Rev. 40, 26–33 (2010)CrossRefGoogle Scholar
  16. 16.
    Caesar, M., Condie, T., Kannan, J., Lakshminarayanan, K., Stoica, I.: ROFL: routing on flat labels. In: The 2006 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, pp. 363–374. ACM, New York (2006)Google Scholar
  17. 17.
    Eugster, P., Felber, P., Guerraoui, R., Kermarrec, A.-M.: The many faces of publish/subscribe. ACM Computing Surveys 35, 114–131 (2003)CrossRefGoogle Scholar
  18. 18.
    Ford, B., Iyengar, J.: Breaking Up the Transport Logjam. In: 7th ACM Workshop on Hot Topics in Networks, HotNets-VII, ACM, New York (2008)Google Scholar
  19. 19.
    Rosenberg, J.: UDP and TCP as the New Waist of the Internet Hourglass, internet draft (2008), http://tools.ietf.org/id/draft-rosenberg-internet-waist-hourglass-00.txt
  20. 20.
    Popa, L., Ghodsi, A., Stoica, I.: HTTP as the Narrow Waist of the Future Internet. UCB Technical Report (2010)Google Scholar
  21. 21.
    Berners-Lee, T., Masinter, L., McCahill, M.: RFC1738: Uniform Resource Locators, URL (1994)Google Scholar
  22. 22.
    Mischke, J., Stiller, B.: A methodology for the design of distributed search in P2P middleware. IEEE Network 18, 30–37 (2004)CrossRefGoogle Scholar
  23. 23.
    Oram (ed.): Peer-To-Peer: Harnessing the Power of Disruptive Technologies. O’Reilly & Associates, Sebastopol (2001)Google Scholar

Copyright information

© IFIP International Federation for Information Processing 2011

Authors and Affiliations

  • Yifan Yu
    • 1
  • Daqing Gu
    • 1
  1. 1.Orange LabsBeijingP.R.C.

Personalised recommendations