Video Conferencing with Content Centric Networking

Size: px
Start display at page:

Download "Video Conferencing with Content Centric Networking"

Transcription

1 Video Conferencing with Content Centric Networking Kai Zhao 1,2, Xueqing Yang 1, Xinming Ma 2 1. Information Engineering College, North China University of Water Rescources and Electric Power,Zhengzhou,china 2. Agricultural College of HeNan Agricultural University, Zhengzhou, China Abstract: A caching scheme for with Content Centric Networking is proposed. The scheme is one of our efforts to explore application designs on top of Content Centric Networking. Unlike the existing methods ACT or VoCCN, the with Content Centric Networking takes the advantage of the cache and the demand of the delay for the user. The scheme proposed accords with the difference of distance with all the partners which brings the different transmission time, and adopts the edge node intermediate to the next nearest node for the partner. Once the content cached is received by the next node, it will be deleted as soon as possible by the local node. The number results reveal that this scheme achieves a better efficiency of cache with a little delay sacrificed. Keywords: content centric networking; ; intermediate node caching 1. Introduction The Internet has evolved from focusing on the communication entities to concentrating on content distribution. Especially in recent years, with the development of the method for streaming media, like audio and video, content plays an important role in the Internet. In this context, CCN [1] has emerged as a promising candidate for the architecture of Future Internet to better respond to the today and future traffic characteristics. In this architecture, caching becomes a universal functionality available at each router. These distributed in-router caches make up the in-network cache system, which can improve network performance remarkably by increasing cache hit rate and reducing upstream traffic. User s real-time requirement of information retrieval becomes more and more strong, this is why media streaming techniques appear, and the growth of access network bandwidth also makes it possible. We can see media streaming techniques everywhere on the Internet today, online video, IPTV and so on. A Voice-over-CCN prototype is proposed in paper [2], the result is functionally and performance equivalent to Voice-over IP but substantially simpler in architecture, implementation and configuration. Since CCN secures content rather than the connections it travels over, VoCCN does not require delegation of either trust or keys to proxies or other network intermediaries and thus is far more secure than VoIP. ACT proposed in paper [3] can serve as a good example on how to design applications over NDN and also a useful tool for research collaborations as well as personal communications. ACT is a completely distributed audio conference tool using a named data approach to demonstrate that using NDN offers more flexibility in design space and results in an intrinsically more scalable and secure solution. A design of CCN live streaming is proposed in paper [4], CCN live streaming splits the video into a sequence of segments, and generates a playlist file, as HTTP live streaming do. The user who wants to play this video streaming can download the small playlist file, and play the video by getting the video segments one by one. All the file delivery is using CCN protocol. By our best knowledge, there is no scheme to consider the with CCN. Because the is an application with demand of real-time and lower shareablity. And the based CCN model need maintain the link state persistently and the partner for the conference has to get the content from the source which product a lot of source waste and privacy leaked. In this paper, we propose a scheme for with CCN based coordinated caching between the edge nodes according to the distance from the source. The scheme save the bandwidth and protect the conference privacy with a delay sacrificed. The remainder of this paper is organized as follows. In Section II, we introduce the background of CCN system model. Section III presents details of the scheme scheme with CCN. Section IV shows the results of simulations in terms of cache hit ratio and access delay. Section V discusses the scheme. Section VI concludes this paper with future work. 2. Reference CCN System Model In this section we briefly introduce the architecture of CCN and a focus on its in-networking caching property. CCN is novel network architecture from PARC. Different from current Internet practice, CCN is based on the key concept of content, and it makes content itself to be central role, rather than the location of content. When a consumer requests a given content, it is not queried in a particular site in the network, so the content can be found anywhere in the network and can be stored in several locations at the same time. The communication mechanism of CCN based on requester-driven and data-centric contains two distinct types of packets: Interest packet and Data packet (depicted in Figure. 1). Interest packet Content Name Selector (order perference, publisher filter,...) Data Packet Content Name MetaInfo (content type, freshness period,...) Nonce Selector (order perference, publisher filter,...) Data Signature (signature type, key locator,...) Figure. 1 Interest and Data Packet architecture In Figure. 2, as mentioned in paper, we illustrate the communication model of CCN. Users who want to obtain content send an interest packet with the name of the desired content to the network. Each router has a content cache called Content Store (CS) to maintain the content if it passed by the router. Upon receiving an interest, a router delivers the content directly from its cache if it has a copy of the content. Otherwise, it forwards the interest to the next router, which is determined by a routing table called Forwarding Information Base (FIB). In FIB, the next router information heading to the corresponding content source is stored based on content names. The interest is forwarded through the path toward the source until it reaches either a router that has the content in its cache or the content source, and then Journal of Residuals Science & Technology, Vol. 13, No. 8,

2 the content follows the reverse path trace by recording in Pending Interest Table (PIT), in which each entry stores the content name the user requested and a set of interfaces the interests come from. The PIT avoids repeated delivery of the same interest and the corresponding content, when multiple interests request the same content, only the first interest is forwarded toward the content source. When the content returns, the router checks the PIT entry and forwards the content to the interfaces which are listed in the PIT entry. lookup miss lookup hit Interest Packet Content Store(CS) Pending Interest Table(PIT) Forwarding Information Base(FIB) forward data add incoming interface drop or NACK upstream delete interest entry downstream forward cache Pending Interest Table(PIT) Data Packet Content Store(CS) Figure. 2 Forwarding process in CCN node In-network caching can significantly improve efficiency of network resource utilization. The CS which used to cache contents is a buffer memory equipped with CCN router. It allows the CCN router to return content without forwarding to content sources when there are consumers who interested in the same content. When the content which is matching interest in the PIT arrives, it is forwarded through the interested faces and will also be cached in the CS by the caching policy. These policies are referred to the cache and replacement policy of the content stored in the cache structure. 3. Video conferencing with CCN 3.1 The basic idea In CCN model, the user who first request one piece content has to get it from the source. When the data packet returns to the user, it will be cached by the nodes along the reverse path. The is always used by the big company or the government organization, and it is lower shareablity so that there is a worse cached efficiency. However, the conference may be persisting a long time for hours, if we maintain a link for each partner and cache the content at the pass node, it will product resource waste and the content can t be shared by the most users and add the risk of attack from the one who interest in the conference(figure.3 (a)). discard data (a) (b) Figure. 3 Original and our basic idea For the concrete user who holds usually, the partners always locate a constant building or city and connected the concrete node. Consequently, the company or government organization may construct a constant topology. If we analyze the distance between the partners nodes and the source node, we can conduct a better cache path by the node location. As depicted in Figure. 3 (b). 3.2 The caching scheme for The caching model. As a big company or government organization, which always lean the link from the ISP to connect the department locating different place to be a union networks. Consequently, the characters of the leaned network are as a known knowledge for the manager of the network, such as the topology, the delay between the nodes which connect the department. In the proposed scheme we assume the delays between the nodes as prior information. As depicted in Figure.4. We focus on the network of a single administrative domain (e.g., an autonomous intra-domain system), where a set of routers with both the routing and storage capability serve content requests originated from end users, as shown in Figure 2. The origin stores all contents, referred to as the origin ; therefore, requests for any content object can always be satisfied by the. Note that is an abstraction of multiple origin s (in practice, there are multiple origin s hosting different contents). Let we consider the simple network model for the with CCN. In Figure.4, the delays between the nodes are a known knowledge. We denote T as the average latency of serving requests from source routers. And the partner by node 5 requests the content from, it will take a delay (ts1+t31+t35), if the cached the replica already, it just will spend time (t35), which bases on the user form node 5 will wait (ts1+t31). Journal of Residuals Science & Technology, Vol. 13, No. 8,

3 ts1 t35 t31 node 5 Figure. 4 The delays between nodes Caching scheme In the model of Figure.4, we figure out the delays tij between the nodes. To make use of the universal caching for with CCN, we conduct the caching scheme as followed and the pseudo code of the algorithm is depicted in Table 1. While the stares, the which nearest the gets the video streaming first, and caches it until the next node 2 gets the content replica. Then deletes the content replica. The caches the content and waits the next interest packet for the content. The content replica should stay in the node for a constant time which is regarding with the distances between the nearest nodes which connected with each department. We must note that: if the time that the node gets the content from next node is much longer than that from the source, the node will get the content from the source directly. 3.3 An example Table 1 Algorithm for caching content Algorithm (interest/data name) For every arriving packet, interest denoted I. tij is the time from the node Vj to Vi. T is the time from source to Vi. The processing for Interest packet. 1. if tij<= T 2. forwarding the interest packet to Vj; 3. else 4. forwarding the interest packet to source ; 5. end if The processing for Data packet. 6. if the life of the content replica Ci is timeout 7. delete Ci; 8. end if 9. if there is no need caching for the next nearby node 1. forwarding the data packet to user; 11. else 12. caching the data packet and set timeout value tij ; 13. forwarding the data packet to user; 14. end if In this section, we display an example of the with CCN which is depicted as Figure. 5. We assume that there are three partners for the conference and the delay is same between neighbor nodes. The maintainer of the conference is called a. And the other can be called End host 1 and 2. Once the conference starts, both host 1 and host 2 are going to request the video streaming. The delays for host 1 and 2 have been computed because of the constant company networks. Consequently, the host 2 get the video streaming chunk will take three hops and host 1 take two hops. Then, the cached each chunk for a while, and the chunk in node3 will be deleted until the end host 2 takes one hop to get it. End Host 1 node 5 End Host 2 Figure.5. Example of the with CCN 4 Number results Journal of Residuals Science & Technology, Vol. 13, No. 8,

4 This section evaluates the scheme mainly from three aspects: (1) download speed, (2) the delay, and (3) the load reduction. 4.1 Experimental Setup We developed our simulation based on the ccnsim[5], which is based on OMNet++ simulation platform. The ccnsim with basic features of the CCN forwarding engine and caching components, is an open source CCN simulator developed in ParisTech. In our simulation, we set the number of content chunks to be 1, and the chunk will be request once while there is no congestion or packet loss. And the chunks are ranked from as the order of the video streaming file. Using the simulator, we implement the forwarding engine of the CCN and evaluate with an random network topology, which is randomly generated by Georgia Tech Internet Topology Model [6]. The link delay between each two cache nodes are the same. In ccnsim, each client represents a group of users. We generated a different request sequence for each client in one simulation run and return the same request sequences as a complete communication. We compared the following cache coordination schemes: The HTTP Live Streaming protocol details can be found in IETF draft [7] and CCN live streaming [8]. The experiments are conducted on a with Intel Xeon E562 CPU (2.4 GHz), and 24 GB main memory. The CPU integrates a small cache (SRAM) between the main memory (DRAM) and the cores. 4.2 Evaluation of downloads speed In this section, we want to display performance of the download speed by adding the partner from 1 to 1 and compare it with http living and at the same situation. The simulation results are showed in Figure. 6. From the picture, we can see that, when one partner joins in the conference, the has a higher download speed and there is no packet loss or congestion. With the partner s number increasing, our scheme shows the better performance than or. For, the request has to get the chunk from the and lead to congestion and travel a long path. And considers the cache at the edge nodes and got a quick download speed. While not only takes account into the edge node for caching but also the nearby node holding the same replica, it achieves the best performance. And we can see that, the more partners, the more quickly download speed. 6 5 download speed(kb/s) Evaluation of the delay number of partners Figure. 6 The relation of the number of partners and download speed We conduct the delay performance simulation at the same situation. The results are showed in Figure.7. The has a lower delay when there is a few partners, but its delay continue increasing with more partners joining in the conference. The reason is that the request has to arrive at the for every video chunk, so the packet will travel a long path. Meanwhile, the congestion will appear with the number of the partners increasing. Consequently, delay performance of the and didn t change dramatically according with the partner s numbers increasing. The edge node caches the same replica for the partners in both schemes. Especially, the nearby node can get the replicas from its neatest node by the predefined path in and it can reduce the delay of the nearby node who requested the video chunk first delay(ms) Evaluation of the loads reduction number of the partners Figure. 7 The relation of the number of partners and delay Journal of Residuals Science & Technology, Vol. 13, No. 8,

5 Let we check the load reductions (depicted in Figure.8) for three schemes at the same situation by comparing the ratio (arrive packets/total packets). Obviously, the whose interest packets must arrive at the to get the chunk has a ratio 1 whatever how many partner joined in the conference. Otherwise, has a much lower loads than but a higher than. For each partner in, the request packet has to arrive at the for the chunk which is wanted first, but for the partner in scheme, the partner can get the chunk (whether or not it is first request) from the nearby node that holds the wanted chunk. As a result, a lot of requests can be satisfied by the logical nearby edge nodes, and the loads can be reduced mostly. 1 load ratio(arrvial packets/total packets) Discussion number of partners Figure. 8 The relation of the number of partners and reduction There is a lot of cache policies based on content popularity in CCN research literacy, though they all are for the low time demand and high shareability. With the low shareability and real-time demand, there is no scheme for the in CCN. For constant networks, we can design an efficiency caching scheme for the. In this paper, the scheme is proposed according with the delay between nearby nodes and sacrifices a few delays. For the partner of the, a few delays won t product any influence on the news transition, but can reduce the traffic between the lean networks and cut the affording of the lean link. Consequently, the scheme proposed can be adopted by big company or government organization. 6 Conclusion In this paper, a caching scheme for with CCN is proposed. According with the characters of the special network for company or organization, a concrete caching path is designed for video streaming chunk transition. The number results show that: compared with the existing scheme for live streaming, our scheme can get a better performance with higher downloading speed; a fewer delay and lower loads. In the future work, we consider how to make the scheme to be application in real use. Acknowledgment The research was supported by Henan province education department (No.15A1211) Reference [1] Jacobson V, Smetters D K, Thornton J D, et al. Networking named content. ACM Conference on Emerging NETWORKING Experiments and Technology, CONEXT 29, Rome, Italy, December. 212, pp [2] Jacobson V, Smetters D K, Briggs N H, et al. VoCCN: voice-over content-centric networks. The Workshop on Re-Architecting the Internet. ACM, 29, pp [3] Zhu Z, Wang S, Yang X, et al. ACT: Audio conference tool over named data networking. Icn, 211, 44(3), pp [4] Xu H, Chen Z, Chen R, et al. Live Streaming with Content Centric Networking. Terapevticheski Arkhiv, 212, 46(6), pp [5] Chiocchetti R, Rossi D, Rossini G. ccnsim: An highly scalable CCN simulator. Communications (ICC), 213 IEEE International Conference on. IEEE, 213, pp [6] E. W. Zegura, K. L. Calvert, and S. Bhattacharjee, How to model an Internetwork, in Proc. IEEE INFOCOM, San Francisco, CA, USA, Mar. 1996, pp [7] IETF draft, HTTP live streaming, [8] Apple HTTP live streaming site, Journal of Residuals Science & Technology, Vol. 13, No. 8,

Live Streaming with Content Centric Networking

Live Streaming with Content Centric Networking 2012 Third International Conference on Networking and Distributed Computing Live Streaming with Content Centric Networking Hongfeng Xu 2,3, Zhen Chen 1,3, Rui Chen 2,3, Junwei Cao 1,3 1 Research Institute

More information

IN recent years, the amount of traffic has rapidly increased

IN recent years, the amount of traffic has rapidly increased , March 15-17, 2017, Hong Kong Content Download Method with Distributed Cache Management Masamitsu Iio, Kouji Hirata, and Miki Yamamoto Abstract This paper proposes a content download method with distributed

More information

Networking Named Content: Content-Centric Networking. John Rula

Networking Named Content: Content-Centric Networking. John Rula Networking Named Content: Content-Centric Networking John Rula Overview Replacing traditional host based routing with named content routing Consumers request a data s name instead of a host (ip address)

More information

Optimal Cache Allocation for Content-Centric Networking

Optimal Cache Allocation for Content-Centric Networking Optimal Cache Allocation for Content-Centric Networking Yonggong Wang, Zhenyu Li, Gaogang Xie Chinese Academy of Sciences Gareth Tyson, Steve Uhlig QMUL Yonggong Wang, Zhenyu Li, Gareth Tyson, Steve Uhlig,

More information

Optimized Vehicular Traffic Flow Strategy using Content Centric Network based Azimuth Routing

Optimized Vehicular Traffic Flow Strategy using Content Centric Network based Azimuth Routing , pp.80-84 http://dx.doi.org/10.14257/astl.2014.64.20 Optimized Vehicular Traffic Flow Strategy using Content Centric Network based Azimuth Routing ByungKwan Lee 1, EunHee Jeong 2 1 Department of Computer,

More information

Efficient Mobile Content-Centric Networking. Using Fast Duplicate Name Prefix Detection. Mechanism

Efficient Mobile Content-Centric Networking. Using Fast Duplicate Name Prefix Detection. Mechanism Contemporary Engineering Sciences, Vol. 7, 2014, no. 24, 1345-1353 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2014.49166 Efficient Mobile Content-Centric Networking Using Fast Duplicate

More information

Cache Less for More in Information- Centric Networks W. K. Chai, D. He, I. Psaras and G. Pavlou (presenter)

Cache Less for More in Information- Centric Networks W. K. Chai, D. He, I. Psaras and G. Pavlou (presenter) Cache Less for More in Information- Centric Networks W. K. Chai, D. He, I. Psaras and G. Pavlou (presenter) Department of Electronic & Electrical Engineering University College London London WC1E 6EA United

More information

MCBS: Matrix Computation Based Simulator of NDN

MCBS: Matrix Computation Based Simulator of NDN JOURNAL OF COMPUTERS, VOL. 9, NO. 9, SEPTEMBER 2014 2007 MCBS: Matrix Computation Based Simulator of NDN Xiaoke Jiang, Jun Bi, You Wang Institute for Network Sciences and Cyberspace, Tsinghua University

More information

CLUSTER BASED IN NETWORKING CACHING FOR CONTENT CENTRIC NETWORKING

CLUSTER BASED IN NETWORKING CACHING FOR CONTENT CENTRIC NETWORKING CLUSTER BASED IN NETWORKING CACHING FOR CONTENT CENTRIC NETWORKING S.Poornima, M.Phil Research Scholar, Department of Computer Sciences and Applications, Vivekanandha College Of Arts And Sciences For Women(Autonomous),

More information

An Cross Layer Collaborating Cache Scheme to Improve Performance of HTTP Clients in MANETs

An Cross Layer Collaborating Cache Scheme to Improve Performance of HTTP Clients in MANETs An Cross Layer Collaborating Cache Scheme to Improve Performance of HTTP Clients in MANETs Jin Liu 1, Hongmin Ren 1, Jun Wang 2, Jin Wang 2 1 College of Information Engineering, Shanghai Maritime University,

More information

Cache Replacement Strategies for Scalable Video Streaming in CCN

Cache Replacement Strategies for Scalable Video Streaming in CCN Cache Replacement Strategies for Scalable Video Streaming in CCN Junghwan Lee, Kyubo Lim, and Chuck Yoo Dept. Computer Science and Engineering Korea University Seoul, Korea {jhlee, kblim, chuck}@os.korea.ac.kr

More information

Publisher Mobility Support in Content Centric Networks

Publisher Mobility Support in Content Centric Networks Publisher Mobility Support in Content Centric Networks Dookyoon Han, Munyoung Lee, Kideok Cho, Ted Taekyoung Kwon, and Yanghee Choi School of Computer Science and Engineering Seoul National University,

More information

Caching Algorithm for Content-Oriented Networks Using Prediction of Popularity of Content

Caching Algorithm for Content-Oriented Networks Using Prediction of Popularity of Content Caching Algorithm for Content-Oriented Networks Using Prediction of Popularity of Content Hiroki Nakayama, Shingo Ata, Ikuo Oka BOSCO Technologies Inc. Osaka City University Background Cache has an important

More information

Stateless ICN Forwarding with P4 towards Netronome NFP-based Implementation

Stateless ICN Forwarding with P4 towards Netronome NFP-based Implementation Stateless ICN Forwarding with P4 towards Netronome NFP-based Implementation Aytac Azgin, Ravishankar Ravindran, Guo-Qiang Wang aytac.azgin, ravi.ravindran, gq.wang@huawei.com Huawei Research Center, Santa

More information

QoS-Aware Hierarchical Multicast Routing on Next Generation Internetworks

QoS-Aware Hierarchical Multicast Routing on Next Generation Internetworks QoS-Aware Hierarchical Multicast Routing on Next Generation Internetworks Satyabrata Pradhan, Yi Li, and Muthucumaru Maheswaran Advanced Networking Research Laboratory Department of Computer Science University

More information

A Novel Broadcasting Algorithm for Minimizing Energy Consumption in MANET

A Novel Broadcasting Algorithm for Minimizing Energy Consumption in MANET A Novel Broadcasting Algorithm for Minimizing Energy Consumption in MANET Bhagyashri Thakre 1, Archana Raut 2 1 M.E. Student, Mobile Technology, G H Raisoni College of Engineering, Nagpur, India 2 Assistant

More information

Hop-count Based Forwarding for Seamless Producer Mobility in NDN

Hop-count Based Forwarding for Seamless Producer Mobility in NDN Hop-count Based Forwarding for Seamless Producer Mobility in NDN Vignesh Sivaraman and Biplab Sikdar Department of Electrical and Computer Engineering National University of Singapore, Singapore Abstract

More information

SCAN: Scalable Content Routing for Content-Aware Networking

SCAN: Scalable Content Routing for Content-Aware Networking : Scalable Routing for -Aware Networking Munyoung Lee, Kideok Cho, Kunwoo Park, Ted Taekyoung Kwon, and Yanghee Choi School of Computer Science and Engineering Seoul National University, Seoul, Korea Email:

More information

Multicast Technology White Paper

Multicast Technology White Paper Multicast Technology White Paper Keywords: Multicast, IGMP, IGMP Snooping, PIM, MBGP, MSDP, and SSM Mapping Abstract: The multicast technology implements high-efficiency point-to-multipoint data transmission

More information

SCAN: Scalable Content routing for

SCAN: Scalable Content routing for ICC 2011@kyoto SCAN: Scalable routing for content-aware Networking Munyoung Lee, Kideok Cho, Kunwoo Park, Td T Ted Taekyoung Kwon, Yanghee Choi (mylee@mmlab.snu.ac.kr) Seoul National University 2011. 6.

More information

Oi! Short Messaging in Opportunistic Wireless Named-Data Networks (Version 1.0)

Oi! Short Messaging in Opportunistic Wireless Named-Data Networks (Version 1.0) Oi! Short Messaging in Opportunistic Wireless Named-Data Networks (Version 1.0) Technical Report COPE-SITI-TR-18-03 January 31 st, 2018 Editor Omar Aponte (COPELABS/ULHT) Authors Omar Aponte (COPELABS/ULHT)

More information

Content Searching Scheme with Distributed Data Processing Service in Content Centric Networking

Content Searching Scheme with Distributed Data Processing Service in Content Centric Networking J. Basic. Appl. Sci. Res., 4(1)160-165, 2014 2014, TextRoad Publication ISSN 2090-4304 Journal of Basic and Applied Scientific Research www.textroad.com Content Searching Scheme with Distributed Data Processing

More information

Network-Adaptive Video Coding and Transmission

Network-Adaptive Video Coding and Transmission Header for SPIE use Network-Adaptive Video Coding and Transmission Kay Sripanidkulchai and Tsuhan Chen Department of Electrical and Computer Engineering, Carnegie Mellon University, Pittsburgh, PA 15213

More information

Octoshape. Commercial hosting not cable to home, founded 2003

Octoshape. Commercial hosting not cable to home, founded 2003 Octoshape Commercial hosting not cable to home, founded 2003 Broadcasting fee is paid by broadcasters Free for consumers Audio and Video, 32kbps to 800kbps Mesh based, bit-torrent like, Content Server

More information

IMPROVING LIVE PERFORMANCE IN HTTP ADAPTIVE STREAMING SYSTEMS

IMPROVING LIVE PERFORMANCE IN HTTP ADAPTIVE STREAMING SYSTEMS IMPROVING LIVE PERFORMANCE IN HTTP ADAPTIVE STREAMING SYSTEMS Kevin Streeter Adobe Systems, USA ABSTRACT While HTTP adaptive streaming (HAS) technology has been very successful, it also generally introduces

More information

Distributed Systems. 21. Content Delivery Networks (CDN) Paul Krzyzanowski. Rutgers University. Fall 2018

Distributed Systems. 21. Content Delivery Networks (CDN) Paul Krzyzanowski. Rutgers University. Fall 2018 Distributed Systems 21. Content Delivery Networks (CDN) Paul Krzyzanowski Rutgers University Fall 2018 1 2 Motivation Serving web content from one location presents problems Scalability Reliability Performance

More information

CS November 2018

CS November 2018 Distributed Systems 21. Delivery Networks (CDN) Paul Krzyzanowski Rutgers University Fall 2018 1 2 Motivation Serving web content from one location presents problems Scalability Reliability Performance

More information

Introduction to Information Centric Networking

Introduction to Information Centric Networking Introduction to Information Centric Networking... with a Dash of Security Claudio Marxer Computer Networks Group University of Basel Switzerland Open Source IoT & Blockchain

More information

Publisher Mobility Support in Content Centric Networks

Publisher Mobility Support in Content Centric Networks ICOIN 2014@Phuket Publisher Mobility Support in Content Centric Networks Dookyoon Han, Munyoung Lee, Kideok Cho, Ted Taekyoung Kwon, and Yanghee Choi (mylee@mmlab.snu.ac.kr) Seoul National University 2014.02.11

More information

Collaborative Multi-Source Scheme for Multimedia Content Distribution

Collaborative Multi-Source Scheme for Multimedia Content Distribution Collaborative Multi-Source Scheme for Multimedia Content Distribution Universidad Autónoma Metropolitana-Cuajimalpa, Departament of Information Technology, Mexico City, Mexico flopez@correo.cua.uam.mx

More information

A Light-Weight Forwarding Plane for Content-Centric Networks

A Light-Weight Forwarding Plane for Content-Centric Networks A Light-Weight Forwarding Plane for Content-Centric Networks J.J. Garcia-Luna-Aceves 1,2 and Maziar Mirzazad-Barijough 2 1 Palo Alto Research Center, Palo Alto, CA 94304 2 Department of Computer Engineering,

More information

Application aware access and distribution of digital objects using Named Data Networking (NDN)

Application aware access and distribution of digital objects using Named Data Networking (NDN) Application aware access and distribution of digital objects using Named Data Networking (NDN) July 4, 2017 Rahaf Mousa Supervisor: dr.zhiming Zhao University of Amsterdam System and Network Engineering

More information

TOP-CCN: Topology aware Content Centric Networking for Mobile Ad Hoc Networks

TOP-CCN: Topology aware Content Centric Networking for Mobile Ad Hoc Networks TOP-CCN: Topology aware Content Centric Networking for Mobile Ad Hoc Networks Jaebeom Kim, Daewook Shin, and Young-Bae Ko Department of Computer Engineering, Graduate School of Ajou University Suwon, Republic

More information

A Seamless Content Delivery Scheme for Flow Mobility in Content Centric Network

A Seamless Content Delivery Scheme for Flow Mobility in Content Centric Network A Seamless Content Delivery Scheme for Flow Mobility in Content Centric Network Rim Haw and Choong Seon Hong * Department of Computer Engineering Kyung Hee University Yong In, Korea {rhaw, cshong}@khu.ac.kr

More information

Progress Report No. 15. Shared Segments Protection

Progress Report No. 15. Shared Segments Protection NEXT GENERATION NETWORK (NGN) AVAILABILITY & RESILIENCE RESEARCH Progress Report No. 15 Shared Segments Protection The University of Canterbury Team 18 April 2006 Abstract As a complement to the Canterbury

More information

Content Centric Networking

Content Centric Networking Content Centric Networking Van Jacobson Palo Alto Research Center (PARC) IETF77 ISOC Internet Researchers meeting Anaheim, CA 24 March 2010 This talk describes ongoing PARC work on CCN (Content-centric

More information

Towards a CDN over ICN

Towards a CDN over ICN Towards a CDN over ICN Byungjoon Lee, Hongseok Jeon, Seunghyun Yoon, and Hoyoung Song SmartNode Research Team, ETRI, Daejeon, Republic of Korea {bjlee, jeonhs, shpyoon, hsong}@etri.re.kr Keywords: Abstract:

More information

Expires: February 21, Huawei & USTC G. Wang. Huawei Technologies. August 20, 2013

Expires: February 21, Huawei & USTC G. Wang. Huawei Technologies. August 20, 2013 ICN Research Group Internet-Draft Intended status: Informational Expires: February 21, 2014 X. Zhang R. Ravindran Huawei Technologies H. Xie Huawei & USTC G. Wang Huawei Technologies August 20, 2013 Abstract

More information

A Routing Protocol Proposal for NDN Based Ad Hoc Networks Combining Proactive and Reactive Routing Mechanisms

A Routing Protocol Proposal for NDN Based Ad Hoc Networks Combining Proactive and Reactive Routing Mechanisms A Routing Protocol Proposal for NDN Based Ad Hoc Networks Combining Proactive and Reactive Routing Mechanisms Ngo Quang Minh, Ryo Yamamoto, Satoshi Ohzahata, and Toshihiko Kato University of Electro-Communications

More information

Clustering-Based Distributed Precomputation for Quality-of-Service Routing*

Clustering-Based Distributed Precomputation for Quality-of-Service Routing* Clustering-Based Distributed Precomputation for Quality-of-Service Routing* Yong Cui and Jianping Wu Department of Computer Science, Tsinghua University, Beijing, P.R.China, 100084 cy@csnet1.cs.tsinghua.edu.cn,

More information

Performance Evaluation of CCN

Performance Evaluation of CCN Performance Evaluation of CCN September 13, 2012 Donghyun Jang, Munyoung Lee, Eunsang Cho, Ted Taekyoung Kwon (Seoul National University), Byoung-Joon Lee, Myeong-Wuk Jang, Sang-Jun Moon (Samsung Electronics),

More information

Scaled VIP Algorithms for Joint Dynamic Forwarding and Caching in Named Data Networks

Scaled VIP Algorithms for Joint Dynamic Forwarding and Caching in Named Data Networks 1896 1920 1987 2006 Scaled VIP Algorithms for Joint Dynamic Forwarding and Caching in Named Data Networks Ying Cui Shanghai Jiao Tong University, Shanghai, China Joint work with Fan Lai, Feng Qiu, Wenjie

More information

CCN & Network Coding. Cedric Westphal Huawei and UCSC

CCN & Network Coding. Cedric Westphal Huawei and UCSC CCN & Network Coding Cedric Westphal Huawei and UCSC ICN & Network Coding - RFC7933 9.5. Network Coding for Video Distribution in ICN An interesting research area for combining heterogeneous sources is

More information

Thwarting Traceback Attack on Freenet

Thwarting Traceback Attack on Freenet Thwarting Traceback Attack on Freenet Guanyu Tian, Zhenhai Duan Florida State University {tian, duan}@cs.fsu.edu Todd Baumeister, Yingfei Dong University of Hawaii {baumeist, yingfei}@hawaii.edu Abstract

More information

On NDN and ( lack of ) Measurement

On NDN and ( lack of ) Measurement On NDN and ( lack of ) Measurement Thomas Silverston National Institute of Information and Communications Technology (NICT) ICT Testbed Research, Development and Operation Lab P2P-TV Measurement Experiments

More information

A Bandwidth-Broker Based Inter-Domain SLA Negotiation

A Bandwidth-Broker Based Inter-Domain SLA Negotiation A Bandwidth-Broker Based Inter-Domain SLA Negotiation Haci A. Mantar θ, Ibrahim T. Okumus, Junseok Hwang +, Steve Chapin β θ Department of Computer Engineering, Gebze Institute of Technology, Turkey β

More information

On Adaptive Pre-fetching and Caching the Contents in Content Centric Networking

On Adaptive Pre-fetching and Caching the Contents in Content Centric Networking On Adaptive Pre-fetching and Caching the Contents in Content Centric Networking Kyi Thar, Saeed Ullah, Doo Ho Lee, Choong Seon Hong Department of Computer Science and Engineering, Kyung Hee University,

More information

Design and Implementation of A P2P Cooperative Proxy Cache System

Design and Implementation of A P2P Cooperative Proxy Cache System Design and Implementation of A PP Cooperative Proxy Cache System James Z. Wang Vipul Bhulawala Department of Computer Science Clemson University, Box 40974 Clemson, SC 94-0974, USA +1-84--778 {jzwang,

More information

Mobile Transport Layer

Mobile Transport Layer Mobile Transport Layer 1 Transport Layer HTTP (used by web services) typically uses TCP Reliable transport between TCP client and server required - Stream oriented, not transaction oriented - Network friendly:

More information

CSCD 433/533 Advanced Networks

CSCD 433/533 Advanced Networks CSCD 433/533 Advanced Networks Lecture 2 Network Review Winter 2017 Reading: Chapter 1 1 Topics Network Topics Some Review from CSCD330 Applications Common Services Architecture OSI Model AS and Routing

More information

What Benefits Does NDN Have in Supporting Mobility

What Benefits Does NDN Have in Supporting Mobility What Benefits Does NDN Have in Supporting Mobility Xiaoke Jiang, Jun Bi, You Wang Institute for Network Sciences and Cyberspace, Tsinghua University Department of Computer Science and Technology, Tsinghua

More information

CS November 2017

CS November 2017 Distributed Systems 21. Delivery Networks () Paul Krzyzanowski Rutgers University Fall 2017 1 2 Motivation Serving web content from one location presents problems Scalability Reliability Performance Flash

More information

CS 162 Operating Systems and Systems Programming Professor: Anthony D. Joseph Spring Lecture 21: Network Protocols (and 2 Phase Commit)

CS 162 Operating Systems and Systems Programming Professor: Anthony D. Joseph Spring Lecture 21: Network Protocols (and 2 Phase Commit) CS 162 Operating Systems and Systems Programming Professor: Anthony D. Joseph Spring 2003 Lecture 21: Network Protocols (and 2 Phase Commit) 21.0 Main Point Protocol: agreement between two parties as to

More information

CCTCP: A Scalable Receiver-driven Congestion Control Protocol for Content Centric Networking

CCTCP: A Scalable Receiver-driven Congestion Control Protocol for Content Centric Networking CCTCP: A Scalable Receiver-driven Congestion Control Protocol for Content Centric Networking Lorenzo Saino, Cosmin Cocora and George Pavlou Communications and Information Systems Group Department of Electrical

More information

Enabling Correct Interest Forwarding and Retransmissions in a Content Centric Network

Enabling Correct Interest Forwarding and Retransmissions in a Content Centric Network Enabling Correct Interest Forwarding and Retransmissions in a Content Centric Network J. J. Garcia-Luna-Aceves 1,2 and Maziar Mirzazad-Barijough 1 1 Computer Engineering Department, University of California,

More information

ICN Content Security Using Encrypted Manifest and Encrypted Content Chunks

ICN Content Security Using Encrypted Manifest and Encrypted Content Chunks ICN Content Security Using Encrypted Manifest and Encrypted Content Chunks Dante Pacella dante@verizon.com Ashish Sardesai ashish.sardesai@verizon.com Mani Tadayon mani.tadayon@verizon.com Venkat Josyula

More information

The Memetic Algorithm for The Minimum Spanning Tree Problem with Degree and Delay Constraints

The Memetic Algorithm for The Minimum Spanning Tree Problem with Degree and Delay Constraints The Memetic Algorithm for The Minimum Spanning Tree Problem with Degree and Delay Constraints Minying Sun*,Hua Wang* *Department of Computer Science and Technology, Shandong University, China Abstract

More information

Dynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks

Dynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks Dynamic Deferred Acknowledgment Mechanism for Improving the Performance of TCP in Multi-Hop Wireless Networks Dodda Sunitha Dr.A.Nagaraju Dr. G.Narsimha Assistant Professor of IT Dept. Central University

More information

Efficient Resource Management for the P2P Web Caching

Efficient Resource Management for the P2P Web Caching Efficient Resource Management for the P2P Web Caching Kyungbaek Kim and Daeyeon Park Department of Electrical Engineering & Computer Science, Division of Electrical Engineering, Korea Advanced Institute

More information

Improvement of Buffer Scheme for Delay Tolerant Networks

Improvement of Buffer Scheme for Delay Tolerant Networks Improvement of Buffer Scheme for Delay Tolerant Networks Jian Shen 1,2, Jin Wang 1,2, Li Ma 1,2, Ilyong Chung 3 1 Jiangsu Engineering Center of Network Monitoring, Nanjing University of Information Science

More information

Named Data Networking for 5G Wireless

Named Data Networking for 5G Wireless Named Data Networking for 5G Wireless Edmund Yeh Electrical and Computer Engineering Northeastern University New York University January 27, 2017 Overview NDN: a major information-centric networking architecture

More information

MAPREDUCE FOR BIG DATA PROCESSING BASED ON NETWORK TRAFFIC PERFORMANCE Rajeshwari Adrakatti

MAPREDUCE FOR BIG DATA PROCESSING BASED ON NETWORK TRAFFIC PERFORMANCE Rajeshwari Adrakatti International Journal of Computer Engineering and Applications, ICCSTAR-2016, Special Issue, May.16 MAPREDUCE FOR BIG DATA PROCESSING BASED ON NETWORK TRAFFIC PERFORMANCE Rajeshwari Adrakatti 1 Department

More information

Measuring QoS of Nearest Replica Routing Forwarding Strategy on Named Data Networking for Triple Play Services

Measuring QoS of Nearest Replica Routing Forwarding Strategy on Named Data Networking for Triple Play Services Measuring QoS of Nearest Replica Routing Forwarding Strategy on Named Data Networking for Triple Play Services Bambang Susilo Electrical Engineering Department, Faculty of Engineering Universitas Indonesia

More information

Module 15 Communication at Data Link and Transport Layer

Module 15 Communication at Data Link and Transport Layer Computer Networks and ITCP/IP Protocols 1 Module 15 Communication at Data Link and Transport Layer Introduction Communication at data link layer is very important as it is between two adjacent machines

More information

Assignment 5. Georgia Koloniari

Assignment 5. Georgia Koloniari Assignment 5 Georgia Koloniari 2. "Peer-to-Peer Computing" 1. What is the definition of a p2p system given by the authors in sec 1? Compare it with at least one of the definitions surveyed in the last

More information

Delay Constrained ARQ Mechanism for MPEG Media Transport Protocol Based Video Streaming over Internet

Delay Constrained ARQ Mechanism for MPEG Media Transport Protocol Based Video Streaming over Internet Delay Constrained ARQ Mechanism for MPEG Media Transport Protocol Based Video Streaming over Internet Hong-rae Lee, Tae-jun Jung, Kwang-deok Seo Division of Computer and Telecommunications Engineering

More information

Consumer driven Adaptive Rate Control for Real-time Video Streaming in CCN/NDN

Consumer driven Adaptive Rate Control for Real-time Video Streaming in CCN/NDN Consumer driven Adaptive Rate Control for Real-time Video Streaming in CCN/NDN Takahiro YONEDA, Ryota OHNISHI, Eiichi MURAMOTO(Presenter),, Panasonic Corporation Jeff Burke, UCLA Contact: muramoto.eiichi@jp.panasonic.com

More information

DD2490 p IP Multicast routing. Multicast routing. Olof Hagsand KTH CSC

DD2490 p IP Multicast routing. Multicast routing. Olof Hagsand KTH CSC DD2490 p4 2010 IP Multicast routing Multicast routing Olof Hagsand KTH CSC 1 Literature RFC 4601 Section 3 (you may need some definitions from Section 2). See reading instructions on web. 2 Deployment

More information

What Benefits Does NDN Have in Supporting Mobility

What Benefits Does NDN Have in Supporting Mobility What Benefits Does NDN Have in Supporting Mobility Xiaoke Jiang, Jun Bi, You Wang {jiangxk, wangyou}@mails.tsinghua.edu.cn, junbi@tsinghua.edu.cn Institute for Network Sciences and Cyberspace, Tsinghua

More information

Journal of Electronics and Communication Engineering & Technology (JECET)

Journal of Electronics and Communication Engineering & Technology (JECET) Journal of Electronics and Communication Engineering & Technology (JECET) JECET I A E M E Journal of Electronics and Communication Engineering & Technology (JECET)ISSN ISSN 2347-4181 (Print) ISSN 2347-419X

More information

Mobility Study for Named Data Networking in Wireless Access Networks

Mobility Study for Named Data Networking in Wireless Access Networks Mobility Study for Named Data Networking in Wireless Access Networks Aytac Azgin, Ravishankar Ravindran, Guoqiang Wang Huawei Research Center, Santa Clara, CA, USA {aytac.azgin,ravi.ravindran,gq.wang}@huawei.com

More information

Research on Transmission Based on Collaboration Coding in WSNs

Research on Transmission Based on Collaboration Coding in WSNs Research on Transmission Based on Collaboration Coding in WSNs LV Xiao-xing, ZHANG Bai-hai School of Automation Beijing Institute of Technology Beijing 8, China lvxx@mail.btvu.org Journal of Digital Information

More information

An Evaluation of Shared Multicast Trees with Multiple Active Cores

An Evaluation of Shared Multicast Trees with Multiple Active Cores Brigham Young University BYU ScholarsArchive All Faculty Publications 2001-07-01 An Evaluation of Shared Multicast Trees with Multiple Active Cores Daniel Zappala daniel_zappala@byu.edu Aaron Fabbri Follow

More information

Design and Implementation of an Anycast Efficient QoS Routing on OSPFv3

Design and Implementation of an Anycast Efficient QoS Routing on OSPFv3 Design and Implementation of an Anycast Efficient QoS Routing on OSPFv3 Han Zhi-nan Yan Wei Zhang Li Wang Yue Computer Network Laboratory Department of Computer Science & Technology, Peking University

More information

A Low-Overhead Hybrid Routing Algorithm for ZigBee Networks. Zhi Ren, Lihua Tian, Jianling Cao, Jibi Li, Zilong Zhang

A Low-Overhead Hybrid Routing Algorithm for ZigBee Networks. Zhi Ren, Lihua Tian, Jianling Cao, Jibi Li, Zilong Zhang A Low-Overhead Hybrid Routing Algorithm for ZigBee Networks Zhi Ren, Lihua Tian, Jianling Cao, Jibi Li, Zilong Zhang Chongqing Key Lab of Mobile Communications Technology, Chongqing University of Posts

More information

Multimedia! 23/03/18. Part 3: Lecture 3! Content and multimedia! Internet traffic!

Multimedia! 23/03/18. Part 3: Lecture 3! Content and multimedia! Internet traffic! Part 3: Lecture 3 Content and multimedia Internet traffic Multimedia How can multimedia be transmitted? Interactive/real-time Streaming 1 Voice over IP Interactive multimedia Voice and multimedia sessions

More information

Part 3: Lecture 3! Content and multimedia!

Part 3: Lecture 3! Content and multimedia! Part 3: Lecture 3! Content and multimedia! Internet traffic! Multimedia! How can multimedia be transmitted?! Interactive/real-time! Streaming! Interactive multimedia! Voice over IP! Voice and multimedia

More information

Quality of Service in Ultrabroadband models

Quality of Service in Ultrabroadband models Quality of Service in Ultrabroadband models Elias Aravantinos ICT Consultant, CITI Managing Director, Exelixisnet earavantinos@exelixisnet.com April 4, 2008 TELECOM ParisTech Contents 1 2 3 4 UBB & QoS

More information

Multicast EECS 122: Lecture 16

Multicast EECS 122: Lecture 16 Multicast EECS 1: Lecture 16 Department of Electrical Engineering and Computer Sciences University of California Berkeley Broadcasting to Groups Many applications are not one-one Broadcast Group collaboration

More information

Proactive-Caching based Information Centric Networking Architecture for Reliable Green Communication in ITS

Proactive-Caching based Information Centric Networking Architecture for Reliable Green Communication in ITS ITU Kaleidoscope 2015 Trust in the Information Society Proactive-Caching based Information Centric Networking Architecture for Reliable Green Communication in ITS Presenter: Prof. PhD. Takuro SATO Waseda

More information

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET

QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET 2011 International Conference on Information and Network Technology IPCSIT vol.4 (2011) (2011) IACSIT Press, Singapore QoS Routing By Ad-Hoc on Demand Vector Routing Protocol for MANET Ashwini V. Biradar

More information

Distributed Mobility Control for Mobile-Oriented Future Internet Environments

Distributed Mobility Control for Mobile-Oriented Future Internet Environments Distributed Mobility Control for Mobile-Oriented Future Internet Environments Ji-In Kim Kyungpook National University Daegu, KOREA jiin16@gmail.com Heeyoung JUNG ETRI Daejon, KOREA hyjung@etri.re.kr Seok

More information

GreenICN Overview GreenICN: Architecture and Applications of Green Information Centric Networking

GreenICN Overview GreenICN: Architecture and Applications of Green Information Centric Networking GreenICN Overview GreenICN: Architecture and Applications of Green Information Centric Networking Mayutan Arumaithurai University of Goettingen Research Activities and Future of EU/US/JP ICN projects Workshop

More information

Named Data Networking (NDN) CLASS WEB SITE: NDN. Introduction to NDN. Updated with Lecture Notes. Data-centric addressing

Named Data Networking (NDN) CLASS WEB SITE:   NDN. Introduction to NDN. Updated with Lecture Notes. Data-centric addressing CLASS WEB SITE: http://upmcsms.weebly.com/ Updated with Lecture Notes Named Data Networking (NDN) Introduction to NDN Named Data Networking (NDN) IP NDN Host-centric addressing Data-centric addressing

More information

Data Structure Optimization of AS_PATH in BGP

Data Structure Optimization of AS_PATH in BGP Data Structure Optimization of AS_PATH in BGP Weirong Jiang Research Institute of Information Technology, Tsinghua University, Beijing, 100084, P.R.China jwr2000@mails.tsinghua.edu.cn Abstract. With the

More information

Chapter 7 CONCLUSION

Chapter 7 CONCLUSION 97 Chapter 7 CONCLUSION 7.1. Introduction A Mobile Ad-hoc Network (MANET) could be considered as network of mobile nodes which communicate with each other without any fixed infrastructure. The nodes in

More information

Supporting Mobility in MobilityFirst

Supporting Mobility in MobilityFirst Supporting Mobility in MobilityFirst F. Zhang, K. Nagaraja, T. Nguyen, D. Raychaudhuri, Y. Zhang WINLAB, Rutgers University Technology Centre of NJ 671 Route 1, North Brunswick, NJ 08902, USA Mobile Data

More information

Master s Thesis 修士論文 論文題目 CACHE CONSISTENCY IN ICN: LEASE 5114FG21-6 THEINT THEINT MYO. Hidenori NAKAZATO. Supervisor 指導教員 年 7 月 1 9 日

Master s Thesis 修士論文 論文題目 CACHE CONSISTENCY IN ICN: LEASE 5114FG21-6 THEINT THEINT MYO. Hidenori NAKAZATO. Supervisor 指導教員 年 7 月 1 9 日 Graduate School of Fundamental Science and Engineering Master s Thesis 修士論文 論文題目 CACHE CONSISTENCY IN ICN: LEASE Student ID 学籍番号 5114FG21-6 Name 氏名 THEINT THEINT MYO Supervisor 指導教員 Hidenori NAKAZATO 印

More information

Cascade Mapping: Optimizing Memory Efficiency for Flash-based Key-value Caching

Cascade Mapping: Optimizing Memory Efficiency for Flash-based Key-value Caching Cascade Mapping: Optimizing Memory Efficiency for Flash-based Key-value Caching Kefei Wang and Feng Chen Louisiana State University SoCC '18 Carlsbad, CA Key-value Systems in Internet Services Key-value

More information

Dynamic Broadcast Scheduling in DDBMS

Dynamic Broadcast Scheduling in DDBMS Dynamic Broadcast Scheduling in DDBMS Babu Santhalingam #1, C.Gunasekar #2, K.Jayakumar #3 #1 Asst. Professor, Computer Science and Applications Department, SCSVMV University, Kanchipuram, India, #2 Research

More information

Performance Assessment of Routing Strategies in Named Data Networking

Performance Assessment of Routing Strategies in Named Data Networking GTTI 2013 Session on Telecommunication Networks An extended version of this paper is currently under revision for presentation in IEEE ICNP 2013 Performance Assessment of Routing Strategies in Named Data

More information

Enhanced Cores Based Tree for Many-to-Many IP Multicasting

Enhanced Cores Based Tree for Many-to-Many IP Multicasting Enhanced Cores Based Tree for Many-to-Many IP Multicasting In this paper, we propose a simple and practical scheme for many-to-many IP multicasting. The proposed scheme is based on the core based tree

More information

COOCHING: Cooperative Prefetching Strategy for P2P Video-on-Demand System

COOCHING: Cooperative Prefetching Strategy for P2P Video-on-Demand System COOCHING: Cooperative Prefetching Strategy for P2P Video-on-Demand System Ubaid Abbasi and Toufik Ahmed CNRS abri ab. University of Bordeaux 1 351 Cours de la ibération, Talence Cedex 33405 France {abbasi,

More information

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol

Analysis of Black-Hole Attack in MANET using AODV Routing Protocol Analysis of Black-Hole Attack in MANET using Routing Protocol Ms Neha Choudhary Electronics and Communication Truba College of Engineering, Indore India Dr Sudhir Agrawal Electronics and Communication

More information

Node selection in Peer-to-Peer content sharing service in mobile cellular networks with Reduction Bandwidth

Node selection in Peer-to-Peer content sharing service in mobile cellular networks with Reduction Bandwidth American Journal of Networks and Communications 2013; 2(2): 40-46 Published online June 10, 2013 (http://www.sciencepublishinggroup.com/j/ajnc) doi: 10.11648/j.ajnc.20130202.13 Node selection in Peer-to-Peer

More information

Named Data Networking. Lixia Zhang UCLA Computer Science Department August 12, 2014

Named Data Networking. Lixia Zhang UCLA Computer Science Department August 12, 2014 Named Data Networking Lixia Zhang UCLA Computer Science Department August 12, 2014 NDN Team Jeff Burke Van Jacobson (architect) Lixia Zhang Kim Claffy Christos Papadopoulos Beichuan Zhang Lan Wang Alex

More information

Internet Load Balancing Guide. Peplink Balance Series. Peplink Balance. Internet Load Balancing Solution Guide

Internet Load Balancing Guide. Peplink Balance Series. Peplink Balance. Internet Load Balancing Solution Guide Peplink Balance Internet Load Balancing Solution Guide http://www.peplink.com Copyright 2010 Peplink Internet Load Balancing Instant Improvement to Your Network Introduction Introduction Understanding

More information

Video Streaming Over the Internet

Video Streaming Over the Internet Video Streaming Over the Internet 1. Research Team Project Leader: Graduate Students: Prof. Leana Golubchik, Computer Science Department Bassem Abdouni, Adam W.-J. Lee 2. Statement of Project Goals Quality

More information

Visualization of Internet Traffic Features

Visualization of Internet Traffic Features Visualization of Internet Traffic Features Jiraporn Pongsiri, Mital Parikh, Miroslova Raspopovic and Kavitha Chandra Center for Advanced Computation and Telecommunications University of Massachusetts Lowell,

More information

Media-Ready Network Transcript

Media-Ready Network Transcript Media-Ready Network Transcript Hello and welcome to this Cisco on Cisco Seminar. I m Bob Scarbrough, Cisco IT manager on the Cisco on Cisco team. With me today are Sheila Jordan, Vice President of the

More information