Master s Thesis 修士論文 論文題目 CACHE CONSISTENCY IN ICN: LEASE 5114FG21-6 THEINT THEINT MYO. Hidenori NAKAZATO. Supervisor 指導教員 年 7 月 1 9 日

Size: px
Start display at page:

Download "Master s Thesis 修士論文 論文題目 CACHE CONSISTENCY IN ICN: LEASE 5114FG21-6 THEINT THEINT MYO. Hidenori NAKAZATO. Supervisor 指導教員 年 7 月 1 9 日"

Transcription

1 Graduate School of Fundamental Science and Engineering Master s Thesis 修士論文 論文題目 CACHE CONSISTENCY IN ICN: LEASE Student ID 学籍番号 5114FG21-6 Name 氏名 THEINT THEINT MYO Supervisor 指導教員 Hidenori NAKAZATO 印 年 7 月 1 9 日 WASEDEA UNIVERSITY i

2 INTERNATIONAL PROGRAM FOR SCIENCE AND ENGINEERING CACHE CONSISTENCY IN ICN: LEASE BY THEINT THEINT MYO 5114FG21-6 A THESIS SUBMITTED TO THE SCHOOL OF INTERNATIONAL PROGRAM FOR SCIENCE AND ENGINEERING WASEDEA UNIVERSITY IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF MASTER OF SCIENCE (ICT) WASEDA UNIVERSITY SEPTEMBER, 2016 提出日 2016 年 7 月 19 日 ii

3 ACKNOWLEDGEMENT The author would like to express to her special thanks to her academic Supervisor, Professor Hidenori NAKAZATO, the Graduate School of Fundamental Science and Engineering (FSE) for his valuable advice, for his kindness, care suggestion for the research study, for suggestion for the idea of research, for giving guidance to the presentation, the preparation of the thesis and for reviewing this manuscript. The author would like to thank to lab s member, who discuss in lab s seminar, for their suggestions about the research. The author would like to thank specially to the members of the board of examiners, for their guidance, helpful discussions, useful comments and suggestions. Greatly thanks to all professors for their valuable lectures and office staffs working at the Graduate School of Fundamental Science and Engineering (FSE), Waseda University, for their supports and helps. Many thanks go to the organization of Japanese Grant Aid for Human Resource Development Scholarship (JDS) and JICE offices from Myanmar and Japan and also responsible persons of Japan government officials giving her a chance for this master course. Finally, the author would like to express her thanks to her parents and family members for giving her encouragement all the time to finish this course. i

4 ABSTRACT Information-Centric Networking (ICN) is the next generation network technology. In ICN, cache consistency is important for some applications like disaster application where content must not be stale data in providing to the client for important information. In Disaster, information always has to be updated accordingly to the condition and client should receive the updated information when client request. So, in Disaster application, cache consistency is a factor to improve the performance of application. In this paper, Lease mechanism will be used to get the cache consistency with the higher performances like low invalidation message, low delay time while updating and low network load. We propose some mechanisms which are added in original lease to get the higher performance while eliminating the weakness of original lease. Lease is a time-based mechanism to provide the cache consistency. But it have still some weakness like need to send message between server and cache before updating the contents and if one of cache cannot send back the acknowledge message to server for updating, there will be delay time for updating the data. So, we propose some technique that is to adjust between the update time, cache time and the replacement time to overcome some of the above weakness. We simulated in ndnsim simulator and the number of control message between the server and the cache and delay time for updating content are presented as an evaluation results. According to the simulation results, propose mechanism has better performance than the original Lease. ii

5 TABLE OF CONTENTS ACKNOWLEDGEMENT... i ABSTRACT... ii TABLE OF CONTENTS...iii LIST OF FIGURES... v LIST OF TABLES... vi Chapter INTRODUCTION Introduction to ICN Motivation and Aim of the Research Thesis Organization... 3 Chapter CONTENT-CENTRIC NETWORKING CCN Overview Basic Operation of CCN Basic Functions and Features of CCN Other Features of CCN Transport Layer of CCN Flow Control, Sequencing and Naming Challenges of CCN Naming Caching Routing Security Chapter Caching Caching Policy Cache Replacement Policy Cache Consistency polling Every Time iii

6 3.2.2 TTL Lease Proposed Scheme General Operation of Proposed Lease Scheme Calculation of Expire Time in Producer Updating in the Producer Replacement Policy for Proposed Lease Scheme Chapter CACHE CONSISTENCY: LEASE Introduction for simulation Simulation Challenges to provide content with tag Content Specification in Producer Simulation Challenges to store in Content Store Simulation Challenges of Discard entry and Replace the cache Algorithm for Overall Operation Evaluation Results for the Proposed Lease Chapter CONCLUSTION AND FUTURE WORKS REFERENCE iv

7 LIST OF FIGURES 2.1 CCN Packet Types CCN forwarding engine model CCN Overview Example of Data s name Content Base Addressing Association of Trust establishment and the publisher Keys Caching about Cache All Caching about Cache Probabilistically Caching about Cache Selectively Caching in router with the higher probability to cache LFU replacement policy FIFO replacement policy Operation of Polling Every Time Operation of Time To Live Normal Case of Lease Updating and delay happened in Lease General operation of Proposed Lease Scheme Procedures that the server operates to provide content with expire time Producer and the net device face how to operate for Traditional Lease To store expire time in CS, on Receiving Data To store expire time in CS, on Outgoing Data Producers to discard the CS entry whose content is expire Producers to replace the CS entry Algorithm for Overall Operation 37 v

8 LIST OF TABLES 4.1 Content Name with Lifetime vi

9 Chapter 1 INTRODUCTION 1.1. Introduction to ICN Nowadays, many researchers are working on Information Centric Networking (ICN) because it has many advantages over the IP network. The internet can provide can provide a connection between two people, who are far away, by phone or video chat and also provide some source of data and knowledge not only to students but also to other ordinary people. With the most advanced technologies, people can control and check their facilities at home while they are outside. People use many network devices like phone, computer, tablets and other devices for their work, business and also for entertainment in their daily lives. So, the usage of internet is also growth. Therefore, there are many requirements to provide the better quality with the internet services, like Bandwidth, Throughput and the delay time. The protocol used in internet is IP Technologies and nowadays, all are worry for about the lack of IP, it will be run out one day. So many researchers are trying the advanced technologies ICN to replace the IP to get best performance of internet like mobility, security, throughput and requirement of bandwidth. The purpose of many proposals about ICN architecture is to solve the above problems. In general IP network, if the client request content like video, movie, data or web page, the request will go to server and reply back through the network. If many client request same contents, these many requests will go to server and server have to reply all client through the network. As a result, there may be heavy traffic, more bandwidth is required and most of the components in network have to work almost all the time and this will have huge energy consumption. In IP network, there are many limitations when the request or the number of users 1

10 becomes higher. In ICN, content can be stored in routers and can be provided when another user requests it if the cache is valid. So the usage of bandwidth can be reduced according to the cache, round-trip time is also short and some of the devices which are located outside of the path between clients and the cache can be in sleep mode for a while to save energy consumption. ICN is the potential technology to replace the IP network Motivation and Aim of the Research In CCN [1], user sends the message for requesting content with a specific name through the network equipment to the one who holds the requested content which can be producer or routers. Contents can be cached at any routers in the network and also more than one place. In IP networks, mostly only servers can provide contents and not the network equipment like routers. In ICN, not only producers but also routers can cache contents and if the content name specified in a request message, called interest packet, matches with the cached content, the cache will provide the content instead of its producer. In this case, the round-trip time for the content can be reduced and traffic in the network can also be reduced. But consumers can get stale data from this cached. Stale data means that the content at its producer is updated while the cached content is not updated. The cached content will keep providing its old content. That makes consumers to receive stale data. So cache also needs to be updated after the content in the producer is updated. This means cache consistency. There are many mechanisms to keep cache consistency, polling every time, TTL and Lease [6]. We can use these mechanisms depending on the applications. 2

11 In this research, we emphasize on a lease. With Lease, when consumer requests content, the interest message requesting the content is forwarded to its producers through the network and the producer will provide the content back to the consumer. While the content is forwarded to the consumer, the content will be cached at one or more places in the network. Content can stay in cache according to its lifetime. If the cache expires and another consumer requests again this content, the interest package will be forwarded to the producer again and the producer will provide. But in Lease, there are some problems. When the content in the producer is updated, the producer has to send the message about the updating to all caches whose contents are still valid and all caches have to acknowledge to the producer. If one of the caches can t reply, the producer has to wait till the cache is expired. So there will be delay time in updating data. Therefore, Lease has strong cache consistency but it has weakness like delay time and overhead messages between the producer and the caches in updating the contents. In this research, we propose some techniques to overcome the Lease s weakness, delay time and the overhead messages in updating the contents Thesis Organization The following chapter 2 is about the overview of basic CCN data structures, packet forwarding operation and the cache. In chapter 3, we discuss about caching policies, cache replacement policies, cache consistency scheme and our proposed Lease mechanism. In chapter 4, we describe about the simulation challenges and evaluation results. In chapter 5, we summarize our thesis and the future works. 3

12 Chapter 2 CONTENT-CENTRIC NETWORKING 2.1. CCN Overview CCN is the Content Centric Networking which based on the named data communications architecture. It is the next generation of IP network with the advantages of strategy, security and so on. Its routing scheme depends on the name of contents instead of locations [1]. There are two types of packets in CCN which are Interest and Data packet as shown in fig 2.1. Interest is the request from the consumer and it contains name of requested data (content name), selector which is for discovering and selecting the best data that the consumer wants and nonce to detect looping interest. Data packet contains the data that the client requested, content name that will be satisfied if it is the prefix of the content name in interest packet, signature, signed info and Data [1]. Figure 2.1 CCN Packet Types 4

13 Basic Operation of CCN In IP network, when the request message from client reaches to the router, router will check the destination IP address and make the routing accordingly to this destination IP address. When it reaches to the source, source will send back the requested data to the location which is corresponding to the source address in the packet [1]. In CCN, there are many differences with IP network, like strategy, efficiency of memory usage and so on. When the consumer requests the content, the interest packet will be forwarded to the producer which may be main source or cache router. In CCN, there are three types of data structures. They are Content Store (CS), Pending Interest Table (PIT) and Forwarding Information Base (FIB) [1]. Content Store (CS) is like the buffer memory of IP router but it can replace the contents with the different replacement policies like LRU, LFU and FIFO replacement policies. CS can store the data packet for other consumers who will request in the future. And this is called cache [1]. Pending Interest Table maintains the condition of the interest packet that forwarded to the producers and records the data name that contained in the interest and faces. Each PIT entries are used when the return data is sent to the consumer [1]. Forwarding Information Base is like the routing table and is used to forward the interest packet to the producer which holds the data name same with the requested one [1] Basic Functions and features of CCN When the consumer sends the request, called the interest package, will be arrived on face. A longest-match lookup is done by checking content name in interest packet. 5

14 Accordingly to the CCN forwarding engine model as shown in fig 2.3, Content Store match will be preferred over a PIT match and over a FIB match. If the requested data packet is already cached on Content Store, cached data will be sent out to the face that the interest arrived. And interest will be discarded. If there is no in Content Store, PIT match will be done If it match, arrival face will be added to the PIT entry and the interest will be discarded because the same interest already forwarded before this. After the producer sends back the data packet, a copy of it will be sent to the face that the interest arrived [1]. If there is no match in the CS and also in the PIT, check matching of FIB entry and there is one, interest will be sent to the producer. And then new PIT entry is created from the interest and its arrival face [1]. Prefix FIB Face List /waseda.jp/ 2,3 PIT Prefix Requesting Face /waseda.jp/naka_lab/index-e.html/v2/s1 3 Content Store Name Data /waseda.jp/naka_lab/index-e.html/v2/s1... F P C Ptr Type Index Face 3 Face 2 Face 1 Application Figure 2.2 CCN forwarding engine model As an overview basic function of CCN, as shown in fig 2.3, when the consumer sends the interest, this interest will be forwarded to reach the producer 6

15 because there is no cache in the first stage. The producer will send back the content to the requester according to the forwarding strategy. While forwarding, one or more routers can cache the copy of this content and save in the content store for the next request for this content. When another consumer requests the same content, the interest will not be forwarded to the producer because the content is already cached in router and it can be forwarded to the consumer instead of the producer. Data 1 Interest 1 R3 R2 Cache Data 1 R1 Server Consumer 1 R4 Interest 2 Data 1 Data Interest Consumer 1 Figure 2.3 CCN overview 2.2. Other Features of CCN Transport Layer of CCN CCN transport layer operates on top of unreliable packet delivery services. So the interests and contents may be lost when they are forwarding. To overcome this, interest should be retransmitted. This is done by receiver s strategy layer [1]. 7

16 Data in CCN cannot be loop because of the discarding of duplicate packets by the basic node mechanisms. But the interests can loop. For this problem, interest packets include a random nonce value to check and discard the duplicate interest [1] Flow Control, Sequencing and Naming In IP network, congestion can occur in the links between routers and it affects the delay, packet loss and disconnection of network links. To eliminate this congestion problem, senders have to adjust their window sizes dynamically. And also some protocol like Spanning Tree Protocol can be used [1]. But in CCN, flow balance is maintained at each hop and no additional techniques are needed to control the congestion in the link [1]. Data is identified by the simple sequence numbers in CCN. Consumer always requests individual pieces from large collections of data, so CCN need sophisticated techniques [1]. User/App supplied name Versioning and segmentation Human Readable: Binary Encoding: /parc.com/photo/supera.jpg/_v<timestamp>/_s1 Globally routable name Organizational name Conventional/automatic 8 Parc.com 6 photo 11 SuperA.jpg 7 FD04A Figure 2.4 Example of Data s name 8

17 The difference of CCN network with the IP network is that CCN based on the name as mentioned in chapter 1. Name is constructed in hierarchically so that an individual name composed of a number of arbitrary octets that shown in fig 2.4. Name notation used URIs with / character separating components. But the delimiters are not included in encoding and in name [1]. Hierarchically structure is as shown in fig 2.5. The request name is /parc.com/photo/supera.jpg/_v<timestamp>/_s1 so first in Parc.com and then choose photo and the addressing of name is in highlight. The requested name is the photo with the first segment of version 2 accordingly to the example [1]. Parc.com photo SuperA.jpg _v1 _v2 _v3 _s0 _s1 _s2 Figure 2.5 Content Base Addressing 9

18 2.3 Challenges of CCN CCN is the next generation of IP network and it has many advance techniques over the IP so many challenges also meet in implantation of CCN. Most of these challenges are Naming, Caching, Routing and Security described in detail as in following Naming As mention in section 2.2.2, CCN is based on the name data network and its structure is hierarchical. When the network is huge, naming of each content is also becoming more complex and the matching also takes more time than the normal network Caching One of CCN feature is caching and it objective is to reduce the traffic load to the server, to store content as much as possible. With the caching, the loading of content store and required memory also have to count in challenges Routing CCN name have no limitation for its length so Routing will also take more time for this name. And Routing Table size also needs to control and update for routing information Security CCN is built on the notion of content-based security [1]. All content in CCN is authenticated with digital signatures and private content is encrypted. 10

19 In content validation, CCN authenticates the binding between names and content, the signature in content that mentioned in fig 2.1 that is over the name, content, and signature verification, signed info. This allows content publishers to bind securely arbitrary names to content. A name-content binding was signed by a particular key. Each signed CCN Data packet contains information to extract public key as a shorthand identifier for the publisher. How the trust establishment associate with the publisher keys is illustrated as in fig 2.6. /parc.com/allie/videos/widgeta.mpg/v2/s1/0x4edb96a4... Signed checksum 0x1c Key Parc.com/allie/desktop public key Signed by Parc.com/allie Signed by Parc.com Figure 2.6 Association of Trust establishment and the publisher keys 11

20 Chapter 3 CACHEING IN CONTENT CENTRIC NETWORKING 3.1. Caching CCN is to overcome the data traffic explosion problem caused by a large number of file sharing and video streaming among many users by providing the many advantages over IP network. Caching is also included in these advantages. Caching is the kind of storing the data in memory and used for further use. As in general, when the consumer is request the data, called the interest packet will be forwarded until the data is found. When the content is found, it will send back the content called the data packet to reach to the consumer. In this forwarding, one of the routers on the path will be cache the copy of this data that is store in content store of router. If another consumer requests the same data, interest will be also forwarded until the content is found. In this case, the previous router will be provided content from its cache. In this way, interest no need to go to the main server. The benefits of this caching is that main server traffic load, bandwidth usage can be reduced and round trip time also can be reduced that means consumer can get the content faster than from the main server. When the requested data is found in one of the routers, it means cache hit and if no cache and interest packet have to go to main server, it means cache miss. Cache hit is usually measured as a cache hit ratio or probability of hit. This is depend on several factors like the cache size, number of request, number of content and the network size that is relationship with the number of router [2]. To store at content store, mostly frequency request content or more popular content are decided to cache depending to their popularity, requirement of memory 12

21 for caching and kind of caching scheme. There are many kinds of cache policies. These will be described in following section. For cache to be stay as long as possible, to use the cache data effectively and the requirement of memory to cache the content, there are so many kinds of replacement policies in CCN that will be described in the following section also Caching Policy There are so many kinds of cache policy that implemented by other researchers. Mostly cache policies are based on three kind of caching for what to cache. These are Cache All, Cache Probabilistically, and Cache Selectively [3]. Another decision is where to cache [3]. Cache All When the content is send back from the server or cache intermediate routers, one of the routers that all the content through it will be cached without any checking the feature of content as show in fig 3.1. Data Packet 6 Data Packet 5 Data Packet 2 Data Packet 1 Data Packet 5 Data Packet 4 Data Packet 2 Data Packet 3 Data Packet 1 Cached data packet Data Packet 4 Data Packet 2 Data Packet 3 Data Packet 1 Data Packet 4 Data Packet 1 Data Packet 3 Data Packet 3 Figure 3.1 Caching about Cache All 13

22 In general, when the consumer request content, it will send the interest packet to the source and router that will not cache for this content will forward this interest packet until it meet with the data packet. When main server or one of the cached intermediate routers hold this data packet, it will send back this data packet to the consumer and other intermediate routers also have a change to cache this data packet. Whether cache or not is decided depending on the policies used. Now Cache All means all of the content that through it will be cached. Actually all of the content will not be cache in practical and to do so, requirement of cache memory will be higher and it will cost more. In other hand, latency for all request will be short than the other. Cache Probabilistically Data Packet 6 Data Packet 5 Data Packet 2 Data Packet 1 with P( ) Cached data packet Data Packet 4 With P( ) Data Packet 1 with P( ) Cached data packet Data Packet 4 With P( ) Data Packet 1 with P( ) Data Packet 4 With P( ) Data Packet 1 with P( ) Data Packet 3 Figure 3.2 Caching about Cache Probabilistically It is one of the caches that have one condition between the content store and the data packet depending on the requirement. This is like the filter between the content store and the data packet. If the data packet has probability that is met with 14

23 the filter requirement, this data packet is acceptable and will be cache by the router and also forwarded to reach to the consumer. If not, this data packet will not be cache and only forward to the consumer. In this way, cache probabilistically can reduce the number of read/write operations in the CS than the cache all that described in above. The main objective of this is to reduce the entries to the CS and to disable the caching of unpopular content in the CS while maintaining the storage of popular entries in the CS. This will make the cache hit rate will be higher. These techniques are illustrated in above fig 3.2. In figure, data packet with P( ) means that this data packet is match with the filter about the probability. So only the data packet that match with the required probability will be cache in CS and forwarded to the consumer. If the data packet is not match with the required probability will not be cache and will be forwarded only. Cache Selectively Data Packet 6 Data Packet 5 Data Packet 2 Data Packet 1 with C( ) Cached data packet Data Packet 4 With C( ) Data Packet 1 with C( ) Cached data packet Data Packet 4 With C( ) Data Packet 1 with C( ) Data Packet 4 With C( ) Data Packet 1 with C( ) Data Packet 3 Figure 3.3 Caching about Cache Selectively 15

24 It is similar with the cache probabilistically, but one case is that here selectively cache may be depending on the probability or other that will be some conditions. If developer wants to cache the videos, before cache to CS, have to check the data packet that is videos or not. Like this filtering will happen depending on the requirement criteria and can vary on demand. And also the content may be popular or unpopular. In fig 3.3, data packet with C( ) means that this data packet is match with the developer defined criteria and want to cache it. Only data packet is not match with criteria and do not want to cache. So the router will cache the data packet with C( ) as shown in fig. Where to Cache It is also one of decision for caching. Where to cache is that which routers will be cache the content. There can be divided into two parts that are all of the routers along the path will be cache. There is no additional feature to choose which router will cache it. And another one is only the specific router will be cache the contents along the path. It is just like the router which has a highest probability to cache the content can cache this content. This can be implemented by calculation the router s highest probability before cache and compare one predefine value and it the condition is true, this router will cache this content that is illustrated with fig 3.4 [3]. In fig 3.4, router with HP means that the higher probability to cache the content and it will cache the content that through it. One of the routers with HP cached data packet 1 because only data packet 1 through it and another router cached data packet 2 only this data packet through it. The router near the consumer cached data packet 1 and 2 because these two data packet through it [3]. 16

25 Router with HP Data Packet 1 Router with HP Data Packet 2 Router with HP Data Packet 2 Data Packet 1 Figure 3.4 Caching in router with the higher probability to cache Cache Replacement Policy Although the caching have many benefit to the network by reducing latency, network load in server and bandwidth usage, some of requirement are still needed to use the caching effectively. To cache the content, memory in router is required. If the caching content is higher, requirement of money also will be higher and entries to the CS, CS lookup and updating will be also considerable. If all of the router memory, cache size of router to cache the new contents are full and there are also still content that have to cache, some of cached content have to be discarded and replaced by new content to be effectively used the caching of CCN. So to be balance with these requirements, some strategies are requirement to be implemented. That is cache replacement policies. There are many replacement policies. Among then some are described in as follow [3]. 17

26 LFU Replacement Policy LFU stands for Least Frequently Used Replacement policy. The cached contents in the CS these are used least frequently will be discarded in first option. So to know the cached content is least frequently used or not, some factors are required to check it. That is to count the time of usage or access to that content as shown in fig 3.5. Router Data Packet 5 Data Packet Access Counters Cached Data Data Packet 3 Data Packet To replace cached content Data Packet 1 19 Figure 3.5 LFU replacement policy In fig 3.5, that show how the LFU replacement policy works. The number beside the data packet of cached data is the access counters of how frequently used of that data. By checking the value of this access counters, replacement or not can be decided. In this fig, Data packet 3 has the least access counter that is 9 so that this data packet 3 will be discarded and new content will be cache. In this way, cache memory can be effectively used. 18

27 FIFO Replacement Policy FIFO stands for the first in first out replacement policy that means the oldest entry of CS is replaced. The first entry in CS will be discarded when the CS need the space to save the new content [4]. Router 5 th Data Packet 4 th Data Packet Cached Data 3 rd Data Packet 2 nd Data Packet 1 st Data Packet To replace cached content Figure 3.6 FIFO replacement policy Fig 3.6 shows about the FIFO replacement policy. 1 st Data packet means the first entry (input) of CS so that it will be discarded to cache new content for replacement. And after that, when the next new content is required to cache, 2 nd Data Packet will be discarded and it will be continuous sequentially [4]. LRU Replacement Policy LRU stands for the Least Recently Used Replacement Policy and that are used in this research. When the cache size is full and other new content have to be cache, LRU will discard the least recently used cache from the CS accordingly to its policies. So active cache will be stay in CS. Active means most frequently request content. 19

28 LRU simple to use and also operation is fast because the running time for request is O(1) [5] Cache Consistency In this section, we will describe about cache consistency. As mention in about section, cache is that the store of content depends on the cache policies used to provide it without going to main server when the same or other consumer send the request for this same content [6]. Cache consistency is also a part of caching but they are a little different in objective. Cache consistency means that the main server s or source s content and the cache content have a connection and there is almost no stale data. Stale data means that the old content of cached [6]. When the consumer request the content, interest will be forwarded until the content is met that may be from cached content or main server. In general caching, when the server updates the content, server has the new version of content but the all of the cached data can t be new version of this content. Only the content the replaced by other content and consumer request again it and then content come back on its path that this router exits. This router can cache again the new version of it when the server sends it back for consumer s request. All of the caches can be updated depending on the consumer request after the main server updated the content. Traditional cache consistency depends on the main server because if the main sever can t update, there will be delay that will be longer depending on the cached content s lifetime [6]. But in some applications like the information have to be updated in time or on time, cache consistency is very critical to grantee for not stale data to the consumer. 20

29 There are also many techniques to provide cache consistency. Among them Polling Every Time, TTL and Lease will be described [6] Pooling Every Time[6] Pooling Every Time have strong consistency scheme [6]. But it has some considerable factors that are network load and the bandwidth usage. The operation of it is show in fig B 4 C A D Data Interest If modified message 304 Figure 3.7 Operation of Pooling Every Time As shown in fig 3.8, when the consumer requests content, in the first stage there is no cache. So the interest will be forwarded to the main sever and sever will send back the content to the consumer. Along the path, routers will be cache as the normal condition. But another consumer request again this content (1 in figure) and that is sure there is cached content along the path but cache first have to contact to the 21

30 sever to make sure that the cached copy is validated or not before sending to the requested consumer (2 in figure). This validation message is if modified since request. If the server replies with 304, it means data is not modified. So that cache can send its cached content to the consumer (3 in figure). If the server replies with the content (C in figure), cache have to remove its cached content and copy and cache the new content that sever sent. And cache will forward it to the consumer (D in figure) [6]. Accordingly to the operation of polling Every Time, in every cache hit, cache has to send message to server and vice visa. When the content is not modified, sever only have to send 304 so only at that case the bandwidth usage will be small comparing with the bandwidth usage in normal content sending by server. But in overall operation, It has strong cache consistency and a very small amount of chance to get the stale data by consumers that is almost no stale data. In the other hand, traffic between cache and sever will be still huge and also bandwidth usage also will be bigger. Latency also will be long [6] TTL TTL stands for Time To Live. TTL is like the life time of content that is predetermined. Content s lifetime is valid by its TTL value. For e.g, TTL of content 1 is 1 hours is that this content will be discard after 1 hours of its current caching time. So after the TTL is invalid and other consumer request for this content, there may be request hits on an expired cached. In this condition, router will send if modifiedsince request to the main server. Server will provide the content and router will cache copy and forward it to the consumer. This is shown in fig 3.8 [14]. 22

31 By adjusting the TTL of content, traffic between cache and the server and bandwidth usage will vary. If TTL is longer, traffic between cache and the server and the bandwidth usage will be small. If TTL is shorter and consumer request many time to the same content, interest are needed to forward to main server frequently and server have to provide content. So that traffic and the bandwidth will be higher but for the consumer have small chance to get steals data than the longer TTL [6][14]. Cached is expire, send if modified message 2 nd interest Data Interest If modified message Figure 3.8 Operation of Time To Live Lease Lease cache consistency is illustrated in fig 3.9 (normal case) and 3.10 (updating case). In fig, left side of the fig is the normal condition that has no updating happening in the main server. In that case, the operation procedure is normal as described as follow: 23

32 i) Normal case ( no updating in main server) Step 1: When the consumer request the content, interest will be forwarded until the content is met that may be cached content or content from main server. Step 2: Step 3: And the source will send back the content that the consumer requested. If another consumers request other content or same content, the producer will take place as step 1 and 2. List of cached router Cached Data Interest Cached Figure 3.9 Normal Case of Lease ii) Step 4: Cached content is expire When cached content is replaced by replacement policy and the consumer requests it again, interest will be forwarded till the main server and main server will provide the content. Cache also will be happened accordingly to the cache policies. 24

33 iii) Updating occur in main server Server has dealay for updating Inviladation message to expire the cache 1. Try to update content Cached This router can t reply ack about expire Cached Inviladation message to expire the cache Acknowledge -expire Inviladation message to expire the cache Inviladation message to expire the cache List of cached router Cached Figure 3.10 Updating and delay happened in Lease Step 5: Before content is updated in the main server, all of the cache need to be expire to be cache consistency and to grantee the consumer not to get the stale data. This is confirmed by message between server and the cached router. Server maintain the list of cached router and when it has to update the content, server sends the message to expire the cache to all routers whose cached is still valid. And also all of the routers have to reply acknowledgement to the server that their cached are expire. If one of the routers can t reply acknowledgement to the server, server has to wait till this cache is expired. This makes the delay for updating. If the caching 25

34 time is long, delay for updating is will be long. Although the lease is strong in cache consistency, it has disadvantages in delay time [6][7]. Lease cache consistency has strong cache consistency but it have delay time for content updating that may be long depending on the lifetime of cached. This delay time can be significant disadvantages when the updating of content is important like the stock share, share market and also for disaster application. Consumer also can get the stale data from the cached which can t reply acknowledge to the server. Besides, server has to send the message to invalidate the cached to all the routers which have cached content. Therefore, server has to maintain the list of all routers which has cached content. It will use the server s memory depending on the number of routers. Numbers of routers are huge; the list also will take more memory space. And also sever need updating to update this list. Cached routers also have to reply acknowledge about they expire the cached content. So there are two messages between one router and server before updating and more routers make more messages between them. These messages can make not only network traffic load and bandwidth requirements. Therefore, two significant disadvantages will be in Lease cache consistency, delay time and overhead message between cached router and server [6][7]. 3.3 Proposed Scheme In this research, we approach one kind of cache consistency that base on the Lease cache consistency by overcoming its disadvantages that will explained in this section General Operation of Proposed Lease Scheme In the proposed scheme, some features are added to overcome the disadvantages of Lease cache consistency which are to reduce the overhead message 26

35 between the cache routers and server, to reduce the delay time in updating, to reduce the server s memory required for store list of cached router. Data exptime Data + exptime Send in tag CS table exptime Data exptime exptime Data exptime CS table exptime exptime Figure 3.11 General operation of Proposed Lease Scheme Figure 3.11 shows about the proposed Lease Scheme. The differences between the original Lease scheme and the proposed one are the exptime and the update time. Exptime means that expire time of cache data that will be provided by the Producer when it provide the content. So expire time will be attached with data by tag. When the data with expire time tag is forwarded accordingly to the normal operation to the consumer, one or more routers along the path will cache the copy of data and expire time in the tag. If another interest comes to this cached router, router will provide cached content with the exptime in tag again. The second router will also save both for future use. The main object of this proposed lease scheme is to 27

36 overcome the weakness of original lease. By using expire time provided by the server, server no need to save the list of cache router. In this way, server s memory requirement can be reduced. And sever no need to send the invalidation message to all cached router to expire the cache data and also routers no need to send back acknowledgement about the expire because in proposed scheme, we control the update time in in producer with the expire time of the content in two ways. One is that the update time in the producer is equal to expire time of the cache. It means while the caches expire, updating in the server also happen in same time. Another one is update time is a little larger than expire time that. When the updating happens in the producer, all the caches already expired. So the producer no needs to wait acknowledge and doesn t have to wait all the cache are expired. That s why overhead messages between the producer and cache and the network traffic load can be reduced Calculation of Expire Time in Producer Expire time is the Lease Time of cached content. In the 1 st time of interest request for content, there is no cache in all routers. So interest will be forwarded to the main server. Server will also provide content and expire time attached in packet tag. So server have to calculate expire time accordingly to this equation. (3.1) is expire time of the content value will be in ns and it means when the content will be expired. means that the lifetime of the content that is the duration of how long the content will be stay in cache. means that the time content is provided by the main server. By this equation, we can get expire time of the contents. 28

37 In here, we can make classification to the content accordingly to the application used. There may be much content type like videos, web pages, photo and so on. Depending on the type of contents, we can vary the lifetime of these contents depending on the requirement that is described in section So the expire times are also will be variable accordingly to the lifetime of the contents. Interest Data? Content Type Data Calculation of Exptime Attached in Tag Content with exptime value Figure 3.12 Procedures that the server operates to provide content with expire time Updating in the Producer In the traditional Lease scheme, before the producer, main server updates the content, it needs to send the message to invalid the cached and also the caches have to reply acknowledge messages. In the proposed Lease scheme, we introduce one mechanism to skip this step to eliminate of sending message between the producer and the cached routers. That is to adjust the updating time of the content in server 29

38 with the lifetime of the content. In this research, we only assign one lifetime for all content for a primary stage of simulation, but to be efficient, we can assign the lifetime of content depending on the requirement by adjusting and by classified by type of content. For the optimal solution, Expire time of the content is equal to the Updating time of the content in the server. In this way, when the server need to update, server no need to check the cache is expire or not because of the equation 3.2, all of the cached will be expired in that time. So this is the optimal condition by effectively used of cache. (3.2) Another solution is Expire time is a little smaller than the Updating time as described in equation 3.3. How much smaller is can be varying depending on the requirements. In this part, the value of also can be adjusted by the number of contents in network and the cache size of network. (3.3) Before the server update, all of the caches in routers are already expire accordingly to this equation 3.3. should be as smaller as possible to be the effectively used of cache space. If not, cache is expired so early than the updating time and if there is no content to store in cache, this cache space will be empty. This is not the critical case but it is a kind of wasting the cache space. But, if there is another content cache before the server update, it is ok for using of cache space. With these two equations (3.2) and (3.3), we can control the cached and server update to grantee the consumer not to accept the stale data by expire the cache with the server updating time. And also can eliminate the overhead message between the server and the cached for updating. 30

39 3.3.4 Replacement Policy for Proposed Lease scheme Replacement policy used in proposed scheme is Least Recently Used (LRU) policies, but in here, we change a little to the LRU polices. Traditional LRU polices is to replace the least recently used cached for the next content. But In here, when the new content has to be cached, cache replacement policies will be discard the one whose expire time is expire. To know which one is expired or not, we can check with expire time of the content that also save in content store of the router got from the tag that provided by the producer. In here, we have two solutions. Optimal solution for the replacement policy is : (3.4) Expire Time is means Lease Time of the cached. When expire Time of the cached is expire, this is discard from the CS for save the cache space So that will be the optimal solution for effectively used of cached space. Another solution is : (3.5) As in equation 3.3, also should be small as much as possible. If it is large, replacement policy will replace with the other content. In that case, if another request will come for this content, interest will have to main server and server will provide the content. If this situation happened frequently, the network traffic load will be large. This will be effect to the main purpose of caching. So we make the Replacement Time is less than the Expire Time. If the Replacement Time is greater than the Expire Time, the cached is already expired but not removes from CS table, and there is no replacement. So the consumers 31

40 have a chance to get the stale data from the cache. That s why, in equation 3.5, replacement time is smaller than expire time of the cache. Chapter 4 CACHE CONSISTENCY: LEASE 4.1. Introduction for simulation We present here about the simulation for proposed Lease. First step is about in producer, main serve additional function for this proposed one. And second is about the tag and third one is for forwarder. And then how to do the replacement to save the cache size effectively that is also the key point of this proposed Lease Simulation Challenges in Producer to provide content with tag Content Specification in Producer As mention in section 3.3.2, producer has to provide, expire time for the data. In here, we will describe how this is provide expire time for the content. Following table is the example of how the content s lifetime is assigned and this have to be predefined by the content owner or publisher. Table 4.1 Content Name with Lifetime Content Name Type Lifetime (s) /parc.com/videos/widget.mpg/_v<timestamp>/_s1 video 10 /upc.edu/fcoras/presentation.pdf/_v<timestamp>/_s2 Pdf 5 /waseda.jp/gits/naka_lab/m2/ccn.ppt/_ver7/_s2 Power point 7 32

41 Table 4.1 is just the example of how the lifetime is assign to the content name for evaluate in Producers. When the interest is received by producer in the condition of no cache in all routers in first stage, producer has to send back the data in reversed path to the consumer. In normal traditional Lease, producer only provide the data to the next step. But in our proposed lease, the producer has to evaluate the lifetime of the content to provide expire time (Lease Time) of the content. Interest Producer Data? Content Type Data Calculation of Exptime Data Packet Create Tag Set exptime to tag Net-Device-Face Content with exptime value Figure 4.1 Producer and the net device face how to operate for proposed Lease 33

42 4.3. Simulation Challenges with Content Store. On Receiving Data Data Copy With Data Data Expire Time value CS Figure 4.2 To store expire time in CS, on Receiving Data CS Data Exptime Set exptime in Tag Data Packet with exptime Tag Figure 4.3 To get expire time in CS, on Outgoing Data 34

43 Content store also has to save expire time when the data is insert to invalid the content. If there is another request come to it, cache is already. So, it will provide the cache and expire time for the next cache. Next cache router also has to save this expire time value for the cached content. This is shown in fig 4.2 and 4.3 In this way, all of the caches can hold expire time for each contents respectively and can be invalid at the same time for each contents. 4.4 Simulation Challenges of Discard entry and Replace the cache Additional part for our proposed lease is that to discard the content whose expire time is expire from the CS. This is described in figure 4.4 according to equation (3.4). Start Check CS Exp time is expire? No Yes Discard this Entry Figure 4.4 Producers to discard the CS entry whose content is expire 35

44 In figure 4.4, we check expire time of the content, if it is expire, discard it from the CS. By this way, we can get the place to save the new content. That makes the cache effectively used. Another additional solution is for replacement when the new content is need to cache in the CS and CS is full. In that case, one of the caches will be replaced to save the new content. It is to search the smallest expire time value in whole CS entry in first. The smallest expire time is means that one will be expire soon than the others. And replace with the new content that has to cache. By this way cache can be used effectively. Start Check entire CS (the smallest one in expire time) Smallest expire time from CS Replace this Entry Figure 4.5 Producers to replace the CS entry 36

45 4.5 Algorithm for Overall Operation Algorithm Producer : For each interest Set Lifetime according to Content Types Check data Send data Calculate Exptime Net-Device-Face Make packet for data Attach Tag to data packet Call function -calculate Exptime- Set Exptime to tag Content Store: For each entry Create CS table (Exptime) Forwarder: On Receiving Data Data Copy with Packet Entry to CS table (Exptime) :On Outgoing Data Set Exptime to tag Send data packet with tag Replacement: For each Replacement While (whole Cs entry) do If Exptime=simulator now ( ) THEN Discard this entry 37

Networking Named Content: Content-Centric Networking. John Rula

Networking Named Content: Content-Centric Networking. John Rula Networking Named Content: Content-Centric Networking John Rula Overview Replacing traditional host based routing with named content routing Consumers request a data s name instead of a host (ip address)

More information

Networking Named Content

Networking Named Content Networking Named Content Van Jacobson Diana K. Smetters James D. Thorton Machael F. Plass Nicholas H. Briggs Rebecca L. Braynard Presented by: Vladislav Perelman Advanced Networking Seminar Jacobs University

More information

Application aware access and distribution of digital objects using Named Data Networking (NDN)

Application aware access and distribution of digital objects using Named Data Networking (NDN) Application aware access and distribution of digital objects using Named Data Networking (NDN) July 4, 2017 Rahaf Mousa Supervisor: dr.zhiming Zhao University of Amsterdam System and Network Engineering

More information

Reliable Transport I: Concepts and TCP Protocol

Reliable Transport I: Concepts and TCP Protocol Reliable Transport I: Concepts and TCP Protocol Brad Karp UCL Computer Science CS 3035/GZ01 29 th October 2013 Part I: Transport Concepts Layering context Transport goals Transport mechanisms 2 Context:

More information

EECS 122: Introduction to Computer Networks Switch and Router Architectures. Today s Lecture

EECS 122: Introduction to Computer Networks Switch and Router Architectures. Today s Lecture EECS : Introduction to Computer Networks Switch and Router Architectures Computer Science Division Department of Electrical Engineering and Computer Sciences University of California, Berkeley Berkeley,

More information

CMPE150 Midterm Solutions

CMPE150 Midterm Solutions CMPE150 Midterm Solutions Question 1 Packet switching and circuit switching: (a) Is the Internet a packet switching or circuit switching network? Justify your answer. The Internet is a packet switching

More information

Performance Evaluation of AODV and DSDV Routing Protocol in wireless sensor network Environment

Performance Evaluation of AODV and DSDV Routing Protocol in wireless sensor network Environment 2012 International Conference on Computer Networks and Communication Systems (CNCS 2012) IPCSIT vol.35(2012) (2012) IACSIT Press, Singapore Performance Evaluation of AODV and DSDV Routing Protocol in wireless

More information

Generic Architecture. EECS 122: Introduction to Computer Networks Switch and Router Architectures. Shared Memory (1 st Generation) Today s Lecture

Generic Architecture. EECS 122: Introduction to Computer Networks Switch and Router Architectures. Shared Memory (1 st Generation) Today s Lecture Generic Architecture EECS : Introduction to Computer Networks Switch and Router Architectures Computer Science Division Department of Electrical Engineering and Computer Sciences University of California,

More information

Efficient Mobile Content-Centric Networking. Using Fast Duplicate Name Prefix Detection. Mechanism

Efficient Mobile Content-Centric Networking. Using Fast Duplicate Name Prefix Detection. Mechanism Contemporary Engineering Sciences, Vol. 7, 2014, no. 24, 1345-1353 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2014.49166 Efficient Mobile Content-Centric Networking Using Fast Duplicate

More information

ET4254 Communications and Networking 1

ET4254 Communications and Networking 1 Topic 9 Internet Protocols Aims:- basic protocol functions internetworking principles connectionless internetworking IP IPv6 IPSec 1 Protocol Functions have a small set of functions that form basis of

More information

Routing Protocols in MANETs

Routing Protocols in MANETs Chapter 4 Routing Protocols in MANETs 4.1 Introduction The main aim of any Ad Hoc network routing protocol is to meet the challenges of the dynamically changing topology and establish a correct and an

More information

Chapter 4: network layer. Network service model. Two key network-layer functions. Network layer. Input port functions. Router architecture overview

Chapter 4: network layer. Network service model. Two key network-layer functions. Network layer. Input port functions. Router architecture overview Chapter 4: chapter goals: understand principles behind services service models forwarding versus routing how a router works generalized forwarding instantiation, implementation in the Internet 4- Network

More information

Last Class: Consistency Models. Today: Implementation Issues

Last Class: Consistency Models. Today: Implementation Issues Last Class: Consistency Models Need for replication Data-centric consistency Strict, linearizable, sequential, causal, FIFO Lecture 15, page 1 Today: Implementation Issues Replica placement Use web caching

More information

Mobile IP and Mobile Transport Protocols

Mobile IP and Mobile Transport Protocols Mobile IP and Mobile Transport Protocols 1 IP routing Preliminaries Works on a hop-by-hop basis using a routing table 32 bits: 129.97.92.42 Address = subnet + host (Mobility No packet for you) Two parts»

More information

IPv6: An Introduction

IPv6: An Introduction Outline IPv6: An Introduction Dheeraj Sanghi Department of Computer Science and Engineering Indian Institute of Technology Kanpur dheeraj@iitk.ac.in http://www.cse.iitk.ac.in/users/dheeraj Problems with

More information

PART X. Internetworking Part 1. (Concept, IP Addressing, IP Routing, IP Datagrams, Address Resolution)

PART X. Internetworking Part 1. (Concept, IP Addressing, IP Routing, IP Datagrams, Address Resolution) PART X Internetworking Part 1 (Concept, IP Addressing, IP Routing, IP Datagrams, Address Resolution) CS422 Part 10 1 Spring 1999 Motivation For Internetworking LANs Low cost Limited distance WANs High

More information

Examination 2D1392 Protocols and Principles of the Internet 2G1305 Internetworking 2G1507 Kommunikationssystem, fk SOLUTIONS

Examination 2D1392 Protocols and Principles of the Internet 2G1305 Internetworking 2G1507 Kommunikationssystem, fk SOLUTIONS Examination 2D1392 Protocols and Principles of the Internet 2G1305 Internetworking 2G1507 Kommunikationssystem, fk Date: January 17 th 2006 at 14:00 18:00 SOLUTIONS 1. General (5p) a) Draw the layered

More information

User Datagram Protocol

User Datagram Protocol Topics Transport Layer TCP s three-way handshake TCP s connection termination sequence TCP s TIME_WAIT state TCP and UDP buffering by the socket layer 2 Introduction UDP is a simple, unreliable datagram

More information

II. Principles of Computer Communications Network and Transport Layer

II. Principles of Computer Communications Network and Transport Layer II. Principles of Computer Communications Network and Transport Layer A. Internet Protocol (IP) IPv4 Header An IP datagram consists of a header part and a text part. The header has a 20-byte fixed part

More information

CS 162 Operating Systems and Systems Programming Professor: Anthony D. Joseph Spring Lecture 21: Network Protocols (and 2 Phase Commit)

CS 162 Operating Systems and Systems Programming Professor: Anthony D. Joseph Spring Lecture 21: Network Protocols (and 2 Phase Commit) CS 162 Operating Systems and Systems Programming Professor: Anthony D. Joseph Spring 2003 Lecture 21: Network Protocols (and 2 Phase Commit) 21.0 Main Point Protocol: agreement between two parties as to

More information

Internet Protocols (chapter 18)

Internet Protocols (chapter 18) Internet Protocols (chapter 18) CSE 3213 Fall 2011 Internetworking Terms 1 TCP/IP Concepts Connectionless Operation Internetworking involves connectionless operation at the level of the Internet Protocol

More information

Physical characteristics (such as packaging, volatility, and erasability Organization.

Physical characteristics (such as packaging, volatility, and erasability Organization. CS 320 Ch 4 Cache Memory 1. The author list 8 classifications for memory systems; Location Capacity Unit of transfer Access method (there are four:sequential, Direct, Random, and Associative) Performance

More information

EE st Term Exam Date: October 9, 2002

EE st Term Exam Date: October 9, 2002 EE 122 1 st Term Exam Date: October 9, 2002 Name: SID: ee122 login: Day/time of section you attend: Problem Points 1 /10 2 /10 3 /20 4 /20 5 /20 6 /20 Total /100 1. Question 1 (10 pt) Use no more than

More information

Stateless ICN Forwarding with P4 towards Netronome NFP-based Implementation

Stateless ICN Forwarding with P4 towards Netronome NFP-based Implementation Stateless ICN Forwarding with P4 towards Netronome NFP-based Implementation Aytac Azgin, Ravishankar Ravindran, Guo-Qiang Wang aytac.azgin, ravi.ravindran, gq.wang@huawei.com Huawei Research Center, Santa

More information

Seminar on. By Sai Rahul Reddy P. 2/2/2005 Web Caching 1

Seminar on. By Sai Rahul Reddy P. 2/2/2005 Web Caching 1 Seminar on By Sai Rahul Reddy P 2/2/2005 Web Caching 1 Topics covered 1. Why Caching 2. Advantages of Caching 3. Disadvantages of Caching 4. Cache-Control HTTP Headers 5. Proxy Caching 6. Caching architectures

More information

Data Link Layer. Our goals: understand principles behind data link layer services: instantiation and implementation of various link layer technologies

Data Link Layer. Our goals: understand principles behind data link layer services: instantiation and implementation of various link layer technologies Data Link Layer Our goals: understand principles behind data link layer services: link layer addressing instantiation and implementation of various link layer technologies 1 Outline Introduction and services

More information

Chapter 13 TRANSPORT. Mobile Computing Winter 2005 / Overview. TCP Overview. TCP slow-start. Motivation Simple analysis Various TCP mechanisms

Chapter 13 TRANSPORT. Mobile Computing Winter 2005 / Overview. TCP Overview. TCP slow-start. Motivation Simple analysis Various TCP mechanisms Overview Chapter 13 TRANSPORT Motivation Simple analysis Various TCP mechanisms Distributed Computing Group Mobile Computing Winter 2005 / 2006 Distributed Computing Group MOBILE COMPUTING R. Wattenhofer

More information

Student Name: University of California at Berkeley College of Engineering Department of Electrical Engineering and Computer Science

Student Name: University of California at Berkeley College of Engineering Department of Electrical Engineering and Computer Science University of California at Berkeley College of Engineering Department of Electrical Engineering and Computer Science CS 162 Spring 2011 I. Stoica FINAL EXAM Friday, May 13, 2011 INSTRUCTIONS READ THEM

More information

CS 640 Introduction to Computer Networks Spring 2009

CS 640 Introduction to Computer Networks Spring 2009 CS 640 Introduction to Computer Networks Spring 2009 http://pages.cs.wisc.edu/~suman/courses/wiki/doku.php?id=640-spring2009 Programming Assignment 3: Transmission Control Protocol Assigned: March 26,

More information

Hop-count Based Forwarding for Seamless Producer Mobility in NDN

Hop-count Based Forwarding for Seamless Producer Mobility in NDN Hop-count Based Forwarding for Seamless Producer Mobility in NDN Vignesh Sivaraman and Biplab Sikdar Department of Electrical and Computer Engineering National University of Singapore, Singapore Abstract

More information

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s

Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s Performance Evaluation of Mesh - Based Multicast Routing Protocols in MANET s M. Nagaratna Assistant Professor Dept. of CSE JNTUH, Hyderabad, India V. Kamakshi Prasad Prof & Additional Cont. of. Examinations

More information

IN recent years, the amount of traffic has rapidly increased

IN recent years, the amount of traffic has rapidly increased , March 15-17, 2017, Hong Kong Content Download Method with Distributed Cache Management Masamitsu Iio, Kouji Hirata, and Miki Yamamoto Abstract This paper proposes a content download method with distributed

More information

CSCI-GA Operating Systems. Networking. Hubertus Franke

CSCI-GA Operating Systems. Networking. Hubertus Franke CSCI-GA.2250-001 Operating Systems Networking Hubertus Franke frankeh@cs.nyu.edu Source: Ganesh Sittampalam NYU TCP/IP protocol family IP : Internet Protocol UDP : User Datagram Protocol RTP, traceroute

More information

Data Link Layer, Part 5 Sliding Window Protocols. Preface

Data Link Layer, Part 5 Sliding Window Protocols. Preface Data Link Layer, Part 5 Sliding Window Protocols These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang's courses at GMU can make a single machine-readable

More information

Programming Assignment 3: Transmission Control Protocol

Programming Assignment 3: Transmission Control Protocol CS 640 Introduction to Computer Networks Spring 2005 http://www.cs.wisc.edu/ suman/courses/640/s05 Programming Assignment 3: Transmission Control Protocol Assigned: March 28,2005 Due: April 15, 2005, 11:59pm

More information

SERVICE DISTRIBUTION MECHANISMS IN INFORMATION-CENTRIC NETWORKING

SERVICE DISTRIBUTION MECHANISMS IN INFORMATION-CENTRIC NETWORKING SERVICE DISTRIBUTION MECHANISMS IN INFORMATION-CENTRIC NETWORKING Bachelorarbeit der Philosophisch-naturwissenschaftlichen Fakultät der Universität Bern vorgelegt von Oliver Stapleton 2015 Leiter der Arbeit:

More information

Introduction to TCP/IP networking

Introduction to TCP/IP networking Introduction to TCP/IP networking TCP/IP protocol family IP : Internet Protocol UDP : User Datagram Protocol RTP, traceroute TCP : Transmission Control Protocol HTTP, FTP, ssh What is an internet? A set

More information

Video Conferencing with Content Centric Networking

Video Conferencing with Content Centric Networking Video Conferencing with Content Centric Networking Kai Zhao 1,2, Xueqing Yang 1, Xinming Ma 2 1. Information Engineering College, North China University of Water Rescources and Electric Power,Zhengzhou,china

More information

ELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition

ELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition ELEC / COMP 177 Fall 2016 Some slides from Kurose and Ross, Computer Networking, 5 th Edition Presentation 2 Security/Privacy Presentations Nov 3 rd, Nov 10 th, Nov 15 th Upload slides to Canvas by midnight

More information

The Transport Layer Reliability

The Transport Layer Reliability The Transport Layer Reliability CS 3, Lecture 7 http://www.cs.rutgers.edu/~sn4/3-s9 Srinivas Narayana (slides heavily adapted from text authors material) Quick recap: Transport Provide logical communication

More information

EEC-484/584 Computer Networks

EEC-484/584 Computer Networks EEC-484/584 Computer Networks Lecture 13 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline 2 Review of lecture 12 Routing Congestion

More information

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet Chapter 2 - Part 1 The TCP/IP Protocol: The Language of the Internet Protocols A protocol is a language or set of rules that two or more computers use to communicate 2 Protocol Analogy: Phone Call Parties

More information

Telecommunication Protocols Laboratory Course. Lecture 3

Telecommunication Protocols Laboratory Course. Lecture 3 Telecommunication Protocols Laboratory Course Lecture 3 Course map Last time: we discussed protocols of the Medium Access Control (MAC) sub-layer Deal with broadcast channels and their (multi-party) protocols

More information

MODULE: NETWORKS MODULE CODE: CAN1102C. Duration: 2 Hours 15 Mins. Instructions to Candidates:

MODULE: NETWORKS MODULE CODE: CAN1102C. Duration: 2 Hours 15 Mins. Instructions to Candidates: BSc.(Hons) Computer Science with Network Security BEng (Hons) Telecommunications Cohort: BCNS/17B/FT Examinations for 2017-2018 / Semester 2 Resit Examinations for BCNS/15A/FT, BTEL/15B/FT & BTEL/16B/FT

More information

Mobile Transport Layer

Mobile Transport Layer Mobile Transport Layer 1 Transport Layer HTTP (used by web services) typically uses TCP Reliable transport between TCP client and server required - Stream oriented, not transaction oriented - Network friendly:

More information

CCNA Exploration Network Fundamentals. Chapter 06 Addressing the Network IPv4

CCNA Exploration Network Fundamentals. Chapter 06 Addressing the Network IPv4 CCNA Exploration Network Fundamentals Chapter 06 Addressing the Network IPv4 Updated: 20/05/2008 1 6.0.1 Introduction Addressing is a key function of Network layer protocols that enables data communication

More information

Introduction to Protocols

Introduction to Protocols Chapter 6 Introduction to Protocols 1 Chapter 6 Introduction to Protocols What is a Network Protocol? A protocol is a set of rules that governs the communications between computers on a network. These

More information

CS321: Computer Networks Congestion Control in TCP

CS321: Computer Networks Congestion Control in TCP CS321: Computer Networks Congestion Control in TCP Dr. Manas Khatua Assistant Professor Dept. of CSE IIT Jodhpur E-mail: manaskhatua@iitj.ac.in Causes and Cost of Congestion Scenario-1: Two Senders, a

More information

User Datagram Protocol (UDP):

User Datagram Protocol (UDP): SFWR 4C03: Computer Networks and Computer Security Feb 2-5 2004 Lecturer: Kartik Krishnan Lectures 13-15 User Datagram Protocol (UDP): UDP is a connectionless transport layer protocol: each output operation

More information

Hybrid Information-Centric Networking

Hybrid Information-Centric Networking Hybrid Information-Centric Networking ICN inside the Internet Protocol Luca Muscariello, Principal Engineer Giovanna Carofiglio, Distinguished Engineer Jordan Augé, Michele Papalini, Mauro Sardara, Alberto

More information

This Lecture. BUS Computer Facilities Network Management. Switching Network. Simple Switching Network

This Lecture. BUS Computer Facilities Network Management. Switching Network. Simple Switching Network This Lecture BUS0 - Computer Facilities Network Management Switching networks Circuit switching Packet switching gram approach Virtual circuit approach Routing in switching networks Faculty of Information

More information

interface Question 1. a) Applications nslookup/dig Web Application DNS SMTP HTTP layer SIP Transport layer OSPF ICMP IP Network layer

interface Question 1. a) Applications  nslookup/dig Web Application DNS SMTP HTTP layer SIP Transport layer OSPF ICMP IP Network layer TDTS06 Computer networks, August 23, 2008 Sketched answers to the written examination, provided by Juha Takkinen, IDA, juhta@ida.liu.se. ( Sketched means that you, in addition to the below answers, need

More information

Module 17: "Interconnection Networks" Lecture 37: "Introduction to Routers" Interconnection Networks. Fundamentals. Latency and bandwidth

Module 17: Interconnection Networks Lecture 37: Introduction to Routers Interconnection Networks. Fundamentals. Latency and bandwidth Interconnection Networks Fundamentals Latency and bandwidth Router architecture Coherence protocol and routing [From Chapter 10 of Culler, Singh, Gupta] file:///e /parallel_com_arch/lecture37/37_1.htm[6/13/2012

More information

Outline. Routing. Introduction to Wide Area Routing. Classification of Routing Algorithms. Introduction. Broadcasting and Multicasting

Outline. Routing. Introduction to Wide Area Routing. Classification of Routing Algorithms. Introduction. Broadcasting and Multicasting Outline Routing Fundamentals of Computer Networks Guevara Noubir Introduction Broadcasting and Multicasting Shortest Path Unicast Routing Link Weights and Stability F2003, CSG150 Fundamentals of Computer

More information

Advanced Network Design

Advanced Network Design Advanced Network Design Organization Whoami, Book, Wikipedia www.cs.uchicago.edu/~nugent/cspp54015 Grading Homework/project: 60% Midterm: 15% Final: 20% Class participation: 5% Interdisciplinary Course

More information

IP Address Assignment

IP Address Assignment IP Address Assignment An IP address does not identify a specific computer. Instead, each IP address identifies a connection between a computer and a network. A computer with multiple network connections

More information

EEC-684/584 Computer Networks

EEC-684/584 Computer Networks EEC-684/584 Computer Networks Lecture 14 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline 2 Review of last lecture Internetworking

More information

Guide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols

Guide to Networking Essentials, 6 th Edition. Chapter 5: Network Protocols Guide to Networking Essentials, 6 th Edition Chapter 5: Network Protocols Objectives Describe the purpose of a network protocol, the layers in the TCP/IP architecture, and the protocols in each TCP/IP

More information

Transport Protocols & TCP TCP

Transport Protocols & TCP TCP Transport Protocols & TCP CSE 3213 Fall 2007 13 November 2007 1 TCP Services Flow control Connection establishment and termination Congestion control 2 1 TCP Services Transmission Control Protocol (RFC

More information

On Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August 1964

On Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August 1964 The requirements for a future all-digital-data distributed network which provides common user service for a wide range of users having different requirements is considered. The use of a standard format

More information

Modification to Ipv6 Neighbor Discovery and Mobile Node Operation

Modification to Ipv6 Neighbor Discovery and Mobile Node Operation RESEARCH INVENTY: International Journal of Engineering and Science ISSN: 2278-4721, Vol. 1, Issue 6 (October 2012), PP 39-49 www.researchinventy.com Modification to Ipv6 Neighbor Discovery and Mobile Node

More information

UNIT IV -- TRANSPORT LAYER

UNIT IV -- TRANSPORT LAYER UNIT IV -- TRANSPORT LAYER TABLE OF CONTENTS 4.1. Transport layer. 02 4.2. Reliable delivery service. 03 4.3. Congestion control. 05 4.4. Connection establishment.. 07 4.5. Flow control 09 4.6. Transmission

More information

Managing Caching Performance and Differentiated Services

Managing Caching Performance and Differentiated Services CHAPTER 10 Managing Caching Performance and Differentiated Services This chapter explains how to configure TCP stack parameters for increased performance ant throughput and how to configure Type of Service

More information

Outline. CS5984 Mobile Computing

Outline. CS5984 Mobile Computing CS5984 Mobile Computing Dr. Ayman Abdel-Hamid Computer Science Department Virginia Tech Outline Review Transmission Control Protocol (TCP) Based on Behrouz Forouzan, Data Communications and Networking,

More information

LS Example 5 3 C 5 A 1 D

LS Example 5 3 C 5 A 1 D Lecture 10 LS Example 5 2 B 3 C 5 1 A 1 D 2 3 1 1 E 2 F G Itrn M B Path C Path D Path E Path F Path G Path 1 {A} 2 A-B 5 A-C 1 A-D Inf. Inf. 1 A-G 2 {A,D} 2 A-B 4 A-D-C 1 A-D 2 A-D-E Inf. 1 A-G 3 {A,D,G}

More information

TCP Congestion Control in Wired and Wireless networks

TCP Congestion Control in Wired and Wireless networks TCP Congestion Control in Wired and Wireless networks Mohamadreza Najiminaini (mna28@cs.sfu.ca) Term Project ENSC 835 Spring 2008 Supervised by Dr. Ljiljana Trajkovic School of Engineering and Science

More information

SEN366 (SEN374) (Introduction to) Computer Networks

SEN366 (SEN374) (Introduction to) Computer Networks SEN366 (SEN374) (Introduction to) Computer Networks Prof. Dr. Hasan Hüseyin BALIK (12 th Week) The Internet Protocol 12.Outline Principles of Internetworking Internet Protocol Operation Internet Protocol

More information

Unit 5: Internet Protocols skong@itt-tech.edutech.edu Internet Protocols She occupied herself with studying a map on the opposite wall because she knew she would have to change trains at some point. Tottenham

More information

Introduction to Networks and the Internet

Introduction to Networks and the Internet Introduction to Networks and the Internet CMPE 80N Announcements Project 2. Reference page. Library presentation. Internet History video. Spring 2003 Week 7 1 2 Today Internetworking (cont d). Fragmentation.

More information

Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol

Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol Simulation & Performance Analysis of Mobile Ad-Hoc Network Routing Protocol V.S.Chaudhari 1, Prof.P.N.Matte 2, Prof. V.P.Bhope 3 Department of E&TC, Raisoni College of Engineering, Ahmednagar Abstract:-

More information

Improving Reliable Transport and Handoff Performance in Cellular Wireless Networks

Improving Reliable Transport and Handoff Performance in Cellular Wireless Networks Improving Reliable Transport and Handoff Performance in Cellular Wireless Networks H. Balakrishnan, S. Seshan, and R. H. Katz ACM Wireless Networks Vol. 1, No. 4, pp. 469-482 Dec. 1995 P. 1 Introduction

More information

Performance Comparison of Caching Strategies for Information-Centric IoT

Performance Comparison of Caching Strategies for Information-Centric IoT Performance Comparison of Caching Strategies for Information-Centric IoT Jakob Pfender, Alvin Valera, Winston Seah School of Engineering and Computer Science Victoria University of Wellington, New Zealand

More information

Mobile Transport Layer Lesson 10 Timeout Freezing, Selective Retransmission, Transaction Oriented TCP and Explicit Notification Methods

Mobile Transport Layer Lesson 10 Timeout Freezing, Selective Retransmission, Transaction Oriented TCP and Explicit Notification Methods Mobile Transport Layer Lesson 10 Timeout Freezing, Selective Retransmission, Transaction Oriented TCP and Explicit Notification Methods 1 Timeout freezing of transmission (TFT) Used in situations where

More information

Reliable Transport I: Concepts and TCP Protocol

Reliable Transport I: Concepts and TCP Protocol Reliable Transport I: Concepts and TCP Protocol Stefano Vissicchio UCL Computer Science COMP0023 Today Transport Concepts Layering context Transport goals Transport mechanisms and design choices TCP Protocol

More information

Outline 9.2. TCP for 2.5G/3G wireless

Outline 9.2. TCP for 2.5G/3G wireless Transport layer 9.1 Outline Motivation, TCP-mechanisms Classical approaches (Indirect TCP, Snooping TCP, Mobile TCP) PEPs in general Additional optimizations (Fast retransmit/recovery, Transmission freezing,

More information

ECE 435 Network Engineering Lecture 9

ECE 435 Network Engineering Lecture 9 ECE 435 Network Engineering Lecture 9 Vince Weaver http://web.eece.maine.edu/~vweaver vincent.weaver@maine.edu 2 October 2018 Announcements HW#4 was posted, due Thursday 1 HW#3 Review md5sum/encryption,

More information

Performance of UMTS Radio Link Control

Performance of UMTS Radio Link Control Performance of UMTS Radio Link Control Qinqing Zhang, Hsuan-Jung Su Bell Laboratories, Lucent Technologies Holmdel, NJ 77 Abstract- The Radio Link Control (RLC) protocol in Universal Mobile Telecommunication

More information

Chapter Motivation For Internetworking

Chapter Motivation For Internetworking Chapter 17-20 Internetworking Part 1 (Concept, IP Addressing, IP Routing, IP Datagrams, Address Resolution 1 Motivation For Internetworking LANs Low cost Limited distance WANs High cost Unlimited distance

More information

Internet Technology. 06. Exam 1 Review Paul Krzyzanowski. Rutgers University. Spring 2016

Internet Technology. 06. Exam 1 Review Paul Krzyzanowski. Rutgers University. Spring 2016 Internet Technology 06. Exam 1 Review Paul Krzyzanowski Rutgers University Spring 2016 March 2, 2016 2016 Paul Krzyzanowski 1 Question 1 Defend or contradict this statement: for maximum efficiency, at

More information

Performance Enhancement of AOMDV with Energy Efficient Routing Based On Random Way Point Mobility Model

Performance Enhancement of AOMDV with Energy Efficient Routing Based On Random Way Point Mobility Model Performance Enhancement of AOMDV with Energy Efficient Routing Based On Random Way Point Mobility Model Geetha.S, Dr.G.Geetharamani Asst.Prof, Department of MCA, BIT Campus Tiruchirappalli, Anna University,

More information

CS 5520/ECE 5590NA: Network Architecture I Spring Lecture 13: UDP and TCP

CS 5520/ECE 5590NA: Network Architecture I Spring Lecture 13: UDP and TCP CS 5520/ECE 5590NA: Network Architecture I Spring 2008 Lecture 13: UDP and TCP Most recent lectures discussed mechanisms to make better use of the IP address space, Internet control messages, and layering

More information

Transport Protocols and TCP: Review

Transport Protocols and TCP: Review Transport Protocols and TCP: Review CSE 6590 Fall 2010 Department of Computer Science & Engineering York University 1 19 September 2010 1 Connection Establishment and Termination 2 2 1 Connection Establishment

More information

Enabling Correct Interest Forwarding and Retransmissions in a Content Centric Network

Enabling Correct Interest Forwarding and Retransmissions in a Content Centric Network Enabling Correct Interest Forwarding and Retransmissions in a Content Centric Network J. J. Garcia-Luna-Aceves 1,2 and Maziar Mirzazad-Barijough 1 1 Computer Engineering Department, University of California,

More information

Today: World Wide Web! Traditional Web-Based Systems!

Today: World Wide Web! Traditional Web-Based Systems! Today: World Wide Web! WWW principles Case Study: web caching as an illustrative example Invalidate versus updates Push versus Pull Cooperation between replicas Lecture 22, page 1 Traditional Web-Based

More information

An Efficient Routing Approach and Improvement Of AODV Protocol In Mobile Ad-Hoc Networks

An Efficient Routing Approach and Improvement Of AODV Protocol In Mobile Ad-Hoc Networks An Efficient Routing Approach and Improvement Of AODV Protocol In Mobile Ad-Hoc Networks Tejomayee Nath #1 & Suneeta Mohanty *2 # School of Computer Engineering, KIIT University Bhubaneswar,, India Abstract

More information

CS457 Transport Protocols. CS 457 Fall 2014

CS457 Transport Protocols. CS 457 Fall 2014 CS457 Transport Protocols CS 457 Fall 2014 Topics Principles underlying transport-layer services Demultiplexing Detecting corruption Reliable delivery Flow control Transport-layer protocols User Datagram

More information

Network Working Group Request for Comments: 1046 ISI February A Queuing Algorithm to Provide Type-of-Service for IP Links

Network Working Group Request for Comments: 1046 ISI February A Queuing Algorithm to Provide Type-of-Service for IP Links Network Working Group Request for Comments: 1046 W. Prue J. Postel ISI February 1988 A Queuing Algorithm to Provide Type-of-Service for IP Links Status of this Memo This memo is intended to explore how

More information

Optimal Cache Allocation for Content-Centric Networking

Optimal Cache Allocation for Content-Centric Networking Optimal Cache Allocation for Content-Centric Networking Yonggong Wang, Zhenyu Li, Gaogang Xie Chinese Academy of Sciences Gareth Tyson, Steve Uhlig QMUL Yonggong Wang, Zhenyu Li, Gareth Tyson, Steve Uhlig,

More information

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET

A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET ISSN: 2278 1323 All Rights Reserved 2016 IJARCET 296 A COMPARISON OF REACTIVE ROUTING PROTOCOLS DSR, AODV AND TORA IN MANET Dr. R. Shanmugavadivu 1, B. Chitra 2 1 Assistant Professor, Department of Computer

More information

The Transmission Control Protocol (TCP)

The Transmission Control Protocol (TCP) The Transmission Control Protocol (TCP) Application Services (Telnet, FTP, e-mail, WWW) Reliable Stream Transport (TCP) Unreliable Transport Service (UDP) Connectionless Packet Delivery Service (IP) Goals

More information

Lecture - 14 Transport Layer IV (Reliability)

Lecture - 14 Transport Layer IV (Reliability) Computer Networks and Internet Protocol Prof. Sandip Chakraborthy Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture - 14 Transport Layer IV (Reliability)

More information

MIDTERM EXAMINATION #2 OPERATING SYSTEM CONCEPTS U N I V E R S I T Y O F W I N D S O R S C H O O L O F C O M P U T E R S C I E N C E

MIDTERM EXAMINATION #2 OPERATING SYSTEM CONCEPTS U N I V E R S I T Y O F W I N D S O R S C H O O L O F C O M P U T E R S C I E N C E MIDTERM EXAMINATION #2 OPERATING SYSTEM CONCEPTS 03-60-367-01 U N I V E R S I T Y O F W I N D S O R S C H O O L O F C O M P U T E R S C I E N C E Intersession 2008 Last Name: First Name: Student ID: PLEASE

More information

TCP : Fundamentals of Computer Networks Bill Nace

TCP : Fundamentals of Computer Networks Bill Nace TCP 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross Administrivia Lab #1 due now! Reminder: Paper Review

More information

Lixia Zhang M. I. T. Laboratory for Computer Science December 1985

Lixia Zhang M. I. T. Laboratory for Computer Science December 1985 Network Working Group Request for Comments: 969 David D. Clark Mark L. Lambert Lixia Zhang M. I. T. Laboratory for Computer Science December 1985 1. STATUS OF THIS MEMO This RFC suggests a proposed protocol

More information

Lecture 9: Bridging & Switching"

Lecture 9: Bridging & Switching Lecture 9: Bridging & Switching" CSE 123: Computer Networks Alex C. Snoeren HW 2 due Wednesday! Lecture 9 Overview" Finishing up media access Contention-free methods (rings) Moving beyond one wire Link

More information

Performance Evaluation of MANET through NS2 Simulation

Performance Evaluation of MANET through NS2 Simulation International Journal of Electronic and Electrical Engineering. ISSN 0974-2174, Volume 7, Number 1 (2014), pp. 25-30 International Research Publication House http://www.irphouse.com Performance Evaluation

More information

Transport Layer. Application / Transport Interface. Transport Layer Services. Transport Layer Connections

Transport Layer. Application / Transport Interface. Transport Layer Services. Transport Layer Connections Application / Transport Interface Application requests service from transport layer Transport Layer Application Layer Prepare Transport service requirements Data for transport Local endpoint node address

More information

ETSF05/ETSF10 Internet Protocols Network Layer Protocols

ETSF05/ETSF10 Internet Protocols Network Layer Protocols ETSF05/ETSF10 Internet Protocols Network Layer Protocols 2016 Jens Andersson Agenda Internetworking IPv4/IPv6 Framentation/Reassembly ICMPv4/ICMPv6 IPv4 to IPv6 transition VPN/Ipsec NAT (Network Address

More information

AODV-PA: AODV with Path Accumulation

AODV-PA: AODV with Path Accumulation -PA: with Path Accumulation Sumit Gwalani Elizabeth M. Belding-Royer Department of Computer Science University of California, Santa Barbara fsumitg, ebeldingg@cs.ucsb.edu Charles E. Perkins Communications

More information

Information Network Systems The network layer. Stephan Sigg

Information Network Systems The network layer. Stephan Sigg Information Network Systems The network layer Stephan Sigg Tokyo, November 1, 2012 Error-detection and correction Decoding of Reed-Muller codes Assume a second order (16, 11) code for m = 4. The r-th order

More information