Efficient Content Verification in Named Data Networking
|
|
- Arlene Hampton
- 5 years ago
- Views:
Transcription
1 Efficient Content Verification in Named Data Networking Dohyung Kim 1, Sunwook Nam 2, Jun Bi 3, Ikjun Yeom 1 mr.dhkim@gmail.com 1 Sungkyunkwan University 2 Korea Financial Telecommunications and Clearing Institute 3 singhua University
2 Named Data Networking (NDN) Name-based consumer-driven content delivery Request to Where Request for What Internet R1 R2
3 Named Data Networking (NDN) Name-based consumer-driven content delivery Request to Where Request for What Internet R1 R2 PIT entry is created at routers Interest
4 Named Data Networking (NDN) Name-based consumer-driven content delivery Request to Where Request for What Response R1 Internet R2 PIT-based Content Delivery In-network Caching
5 Named Data Networking (NDN) Name-based consumer-driven content delivery Request to Where Request for What Internet R2 Content is served from in-network cache R1 Interest
6 Secure Communication In IP networks R1 R2
7 Secure Communication In IP networks R1 R2 End-to-end secure channel
8 Secure Communication In IP networks R1 R2 End-to-end secure channel In NDN R1 R2
9 Secure Communication In IP networks R1 R2 End-to-end secure channel In NDN R1 R2 Content itself should be secure
10 Content Poisoning Attack Fabricated content is placed in the content store Router compromise
11 Content Poisoning Attack Fabricated content is placed in the content store Router compromise Injection from attackers server
12 Content Poisoning Attack Fabricated content is placed in the content store Router compromise Injection from attackers server
13 Content Poisoning Attack Distribution of the fabricated content Internet Poisoned content R2 R1
14 Content Poisoning Attack Distribution of the fabricated content Internet Poisoned content R2 R1 Interest
15 Content Poisoning Attack Distribution of the fabricated content Intenet Poisoned content is distributed by the system itself R2 R1
16 Content Poisoning Attack Distribution of the fabricated content Intenet Poisoned content is distributed by the system itself Users are separated from valid content sources R2 R1 Not forwarded Interest Poisoned response
17 NDN Content Verification Signature verification
18 NDN Content Verification Signature verification incurs huge computational overhead
19 Related Work Probabilistic caching - Bianchi, Giuseppe, et al. "Check before storing: What is the performance price of content integrity verification in LRU caching?." ACM SIGCOMM Computer Communication Review 43.3 (2013): Verification overhead is controlled by caching probability
20 Related Work Probabilistic caching - Bianchi, Giuseppe, et al. "Check before storing: What is the performance price of content integrity verification in LRU caching?." ACM SIGCOMM Computer Communication Review 43.3 (2013): Verification overhead is controlled by caching probability Limitation - Recency problem under dynamic content popularity - Limited application Strongly bounded with random caching policy
21 Motivations Why do we verify even the content that is not actually served?
22 Motivations Why do we verify even the content that is not actually served? ns-3 simulation for estimating the amount of serving contents Cache hit rate Proportion of serving content in the CS
23 Objective Reduce verification overhead while preserving functionality of the built-in signature verification
24 The Proposed Scheme Verify serving contents only
25 The Proposed Scheme - Verify Serving Contents Only
26 The Proposed Scheme - Verify Serving Contents Only
27 The Proposed Scheme - Verify Serving Contents Only Signature verification
28 The Proposed Scheme - Verify Serving Contents Only In the proposed scheme, poisoned content is either - Evicted from the content store without any damages to the network - Discarded by the verification mechanism before being brought out to the network
29 The Proposed Scheme Flag for the already verified content Content store structure verify False True name C1Name C2Name data
30 The Proposed Scheme Favor the already-verified content in the content store - Segmented LRU prevents serving content from being evicted by by-passing content in the content store
31 Efficiency Analysis Efficiency metric - : the number of examined poisoned contents - : the number of verifications
32 Efficiency Analysis In the basic scheme, corresponds to the proportion of the requests for the poisoned contents,
33 Efficiency Analysis In the basic scheme, corresponds to the proportion of the requests for the poisoned contents, In the proposed scheme, - is the request arriving rate - is the hit ratio for the unverified contents in the CS
34 Efficiency Analysis Hit ratio for the unverified contents Proportion of requests for content i
35 Efficiency Analysis Hit ratio for the unverified contents Cache-miss probability for the content i
36 Efficiency Analysis Hit ratio for the unverified contents Cache-hit probability for the content i
37 Efficiency Analysis Hit ratio for the unverified contents - According to Che approximation Cache-hit probability for the content i is the size of CS, and t is the residing time in the CS
38 Analytic Results without SLRU
39 Analytic Results with SLRU
40 Analytic Results In the proposed scheme without SLRU In the proposed scheme with SLRU When is close to 0, the proposed scheme achieve a 10 or 20 time larger value of The value of is changed according to the amount of poisoned content,
41 Evaluation Ns-3 simulation with Contents whose popularity follows Zipf-Mandelbrot distribution function - youtube trace from UMASS Campus during Mar in 2008
42 Results - Poisoned contents
43 Results - Effect of Segmented LRU
44 Results - youtube Trace
45 Results - youtube Trace
46 Discussion The access delay is increased due to the verification process - Limited to the first access to the content
47 Discussion The access delay is increased due to the verification process - Limited to the first access to the content Multiple pending interests may distribute the poisoned content - Verification for the content that is matched with multiple pending interests
48 Discussion The access delay is increased due to the verification process - Limited to the first access to the content Multiple pending interests may distribute the poisoned content - Verification for the content that is matched with multiple pending interests Cache is attacked by using unverified data - Might show abnormal cache-hit pattern, that is, different value of (Hit rate / amount of hit data)
49 Conclusion We look at the content poisoning attack in NDN Implementation and its effects
50 Conclusion We look at the content poisoning attack in NDN Implementation and its effects We present an efficient way to reduce overhead of content verification at routers Verification of the serving content only
51 Conclusion We look at the content poisoning attack in NDN Implementation and its effects We present an efficient way to reduce overhead of content verification at routers Verification of the serving content only We minimize verification overhead by favoring the serving contents in the CS Flag and Segmented LRU
52 Q and A Thank you
Efficient Content Verification in Named Data Networking
Efficient Content Verification in Named Data Networking ABSTRACT Dohyung Kim Sungkyunkwan University Suwon, South Korea mr.dhkim@gmail.com Jun Bi Tsinghua University Beijing, China junbi@tsinghua.edu.cn
More informationOn the Analysis of Caches with Pending Interest Tables
On the Analysis of Caches with Pending Interest Tables Mostafa Dehghan 1, Bo Jiang 1 Ali Dabirmoghaddam 2, Don Towsley 1 1 University of Massachusetts Amherst 2 University of California Santa Cruz ICN,
More informationApplication aware access and distribution of digital objects using Named Data Networking (NDN)
Application aware access and distribution of digital objects using Named Data Networking (NDN) July 4, 2017 Rahaf Mousa Supervisor: dr.zhiming Zhao University of Amsterdam System and Network Engineering
More informationIN recent years, the amount of traffic has rapidly increased
, March 15-17, 2017, Hong Kong Content Download Method with Distributed Cache Management Masamitsu Iio, Kouji Hirata, and Miki Yamamoto Abstract This paper proposes a content download method with distributed
More informationMigration Based Page Caching Algorithm for a Hybrid Main Memory of DRAM and PRAM
Migration Based Page Caching Algorithm for a Hybrid Main Memory of DRAM and PRAM Hyunchul Seok Daejeon, Korea hcseok@core.kaist.ac.kr Youngwoo Park Daejeon, Korea ywpark@core.kaist.ac.kr Kyu Ho Park Deajeon,
More informationEngineering Letters, 26:3, EL_26_3_13. A Probability Verification Strategy Based on Credibility of Router in Content Centric Networking
A Probability Verification Strategy Based on Credibility of Router in Content Centric Networking Yi Zhu, Haohao Kang, Jia Shi and Jianlong Yang Abstract As the representative architecture of the next generation
More informationOptimal Cache Allocation for Content-Centric Networking
Optimal Cache Allocation for Content-Centric Networking Yonggong Wang, Zhenyu Li, Gaogang Xie Chinese Academy of Sciences Gareth Tyson, Steve Uhlig QMUL Yonggong Wang, Zhenyu Li, Gareth Tyson, Steve Uhlig,
More informationHop-count Based Forwarding for Seamless Producer Mobility in NDN
Hop-count Based Forwarding for Seamless Producer Mobility in NDN Vignesh Sivaraman and Biplab Sikdar Department of Electrical and Computer Engineering National University of Singapore, Singapore Abstract
More informationLightweight caching strategy for wireless content delivery networks
Lightweight caching strategy for wireless content delivery networks Jihoon Sung 1, June-Koo Kevin Rhee 1, and Sangsu Jung 2a) 1 Department of Electrical Engineering, KAIST 291 Daehak-ro, Yuseong-gu, Daejeon,
More informationEfficient Mobile Content-Centric Networking. Using Fast Duplicate Name Prefix Detection. Mechanism
Contemporary Engineering Sciences, Vol. 7, 2014, no. 24, 1345-1353 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ces.2014.49166 Efficient Mobile Content-Centric Networking Using Fast Duplicate
More informationStateless ICN Forwarding with P4 towards Netronome NFP-based Implementation
Stateless ICN Forwarding with P4 towards Netronome NFP-based Implementation Aytac Azgin, Ravishankar Ravindran, Guo-Qiang Wang aytac.azgin, ravi.ravindran, gq.wang@huawei.com Huawei Research Center, Santa
More informationTime Aware Least Recent Used (TLRU) Cache Management Policy in ICN
Time Aware Least Recent Used (T) Cache Management Policy in ICN Muhammad Bilal*, Shin-Gak Kang** *Dept. of Engineering, University of Science and Technology (ETRI-Campus), Daejeon, Rep. of Korea ** Electronics
More informationAdaptive Caching Algorithms with Optimality Guarantees for NDN Networks. Stratis Ioannidis and Edmund Yeh
Adaptive Caching Algorithms with Optimality Guarantees for NDN Networks Stratis Ioannidis and Edmund Yeh A Caching Network Nodes in the network store content items (e.g., files, file chunks) 1 A Caching
More informationFast Forwarding for NDN
Fast Forwarding for NDN Won So Ashok Narayanan Mark Stapp mjs@cisco.com Cisco Systems IETF ICNRG, 31/7/2013, Berlin CCN/NDN in Two Slides (1) Network forwards and caches named data 'objects'; no host addresses
More informationCache Optimization. Jin-Soo Kim Computer Systems Laboratory Sungkyunkwan University
Cache Optimization Jin-Soo Kim (jinsookim@skku.edu) Computer Systems Laboratory Sungkyunkwan University http://csl.skku.edu Cache Misses On cache hit CPU proceeds normally On cache miss Stall the CPU pipeline
More informationEfficient Resource Management for the P2P Web Caching
Efficient Resource Management for the P2P Web Caching Kyungbaek Kim and Daeyeon Park Department of Electrical Engineering & Computer Science, Division of Electrical Engineering, Korea Advanced Institute
More informationTrace Driven Simulation of GDSF# and Existing Caching Algorithms for Web Proxy Servers
Proceeding of the 9th WSEAS Int. Conference on Data Networks, Communications, Computers, Trinidad and Tobago, November 5-7, 2007 378 Trace Driven Simulation of GDSF# and Existing Caching Algorithms for
More informationCLUSTER BASED IN NETWORKING CACHING FOR CONTENT CENTRIC NETWORKING
CLUSTER BASED IN NETWORKING CACHING FOR CONTENT CENTRIC NETWORKING S.Poornima, M.Phil Research Scholar, Department of Computer Sciences and Applications, Vivekanandha College Of Arts And Sciences For Women(Autonomous),
More informationScaled VIP Algorithms for Joint Dynamic Forwarding and Caching in Named Data Networks
1896 1920 1987 2006 Scaled VIP Algorithms for Joint Dynamic Forwarding and Caching in Named Data Networks Ying Cui Shanghai Jiao Tong University, Shanghai, China Joint work with Fan Lai, Feng Qiu, Wenjie
More informationAn Integration Approach of Data Mining with Web Cache Pre-Fetching
An Integration Approach of Data Mining with Web Cache Pre-Fetching Yingjie Fu 1, Haohuan Fu 2, and Puion Au 2 1 Department of Computer Science City University of Hong Kong, Hong Kong SAR fuyingjie@tsinghua.org.cn
More informationComputer Architecture and Engineering. CS152 Quiz #2. March 3rd, Professor Krste Asanovic. Name:
Computer Architecture and Engineering CS152 Quiz #2 March 3rd, 2008 Professor Krste Asanovic Name: Notes: This is a closed book, closed notes exam. 80 Minutes 10 Pages Not all questions are of equal difficulty,
More informationCaching Prof. James L. Frankel Harvard University. Version of 5:16 PM 5-Apr-2016 Copyright 2016 James L. Frankel. All rights reserved.
Caching Prof. James L. Frankel Harvard University Version of 5:16 PM 5-Apr-2016 Copyright 2016 James L. Frankel. All rights reserved. Memory Hierarchy Extremely limited number of registers in CPU Lots
More informationTOWARDS HIGH-PERFORMANCE NETWORK APPLICATION IDENTIFICATION WITH AGGREGATE-FLOW CACHE
TOWARDS HIGH-PERFORMANCE NETWORK APPLICATION IDENTIFICATION WITH AGGREGATE-FLOW CACHE Fei He 1, 2, Fan Xiang 1, Yibo Xue 2,3 and Jun Li 2,3 1 Department of Automation, Tsinghua University, Beijing, China
More informationLRC: Dependency-Aware Cache Management for Data Analytics Clusters. Yinghao Yu, Wei Wang, Jun Zhang, and Khaled B. Letaief IEEE INFOCOM 2017
LRC: Dependency-Aware Cache Management for Data Analytics Clusters Yinghao Yu, Wei Wang, Jun Zhang, and Khaled B. Letaief IEEE INFOCOM 2017 Outline Cache Management for Data Analytics Clusters Inefficiency
More informationTOP-CCN: Topology aware Content Centric Networking for Mobile Ad Hoc Networks
TOP-CCN: Topology aware Content Centric Networking for Mobile Ad Hoc Networks Jaebeom Kim, Daewook Shin, and Young-Bae Ko Department of Computer Engineering, Graduate School of Ajou University Suwon, Republic
More informationCCNinfo: Discovering Content and Netw ork Information in Content-Centric Netwo rks
CCNinfo: Discovering Content and Netw ork Information in Content-Centric Netwo rks draft-irtf-icnrg-ccninfo-00 Hitoshi Asaeda (NICT) Xun Shao (KIT) 1 History Initial proposal: Contrace Contrace: Traceroute
More informationCache memories are small, fast SRAM-based memories managed automatically in hardware. Hold frequently accessed blocks of main memory
Cache Memories Cache memories are small, fast SRAM-based memories managed automatically in hardware. Hold frequently accessed blocks of main memory CPU looks first for data in caches (e.g., L1, L2, and
More informationA Study of Cache-Based IP Flow Switching
University of Pennsylvania ScholarlyCommons Technical Reports (CIS) Department of Computer & Information Science November 2000 A Study of Cache-Based IP Flow Switching Osman Ertugay University of Pennsylvania
More informationNamed Data Networking for 5G Wireless
Named Data Networking for 5G Wireless Edmund Yeh Electrical and Computer Engineering Northeastern University New York University January 27, 2017 Overview NDN: a major information-centric networking architecture
More informationChapter The LRU* WWW proxy cache document replacement algorithm
Chapter The LRU* WWW proxy cache document replacement algorithm Chung-yi Chang, The Waikato Polytechnic, Hamilton, New Zealand, itjlc@twp.ac.nz Tony McGregor, University of Waikato, Hamilton, New Zealand,
More informationOptimal Content Placement in ICN Vehicular Networks
Optimal Content Placement in ICN Vehicular Networks Federico Bruno, Matteo Cesana, Mario Gerla, Giulia Mauri, Giacomo Verticale Department of Electronics, Information, and Bioengineering, Politecnico di
More informationMPC: Popularity-based Caching Strategy for Content Centric Networks
MPC: Popularity-based Caching Strategy for Content Centric Networks César Bernardini Thomas Silverston Olivier Festor INRIA Nancy Université de Lorraine, France cesar.bernardini@inria.fr ICC 2013 - June
More informationA Light-Weight Forwarding Plane for Content-Centric Networks
A Light-Weight Forwarding Plane for Content-Centric Networks J.J. Garcia-Luna-Aceves 1,2 and Maziar Mirzazad-Barijough 2 1 Palo Alto Research Center, Palo Alto, CA 94304 2 Department of Computer Engineering,
More informationWatching User Generated Videos with Prefetching
Watching User Generated Videos with Prefetching Samamon Khemmarat, Renjie Zhou, Lixin Gao, Michael Zink Electrical and Computer Engineering Department UMass Amherst MMSys 2011, Feb. 24 th User Generated
More informationMODELING AND SIMULATION OF THRESHOLD ANALYSIS FOR PVFS IN WIRELESS SENSOR NETWORKS
Science MODELING AND SIMULATION OF THRESHOLD ANALYSIS FOR PVFS IN WIRELESS SENSOR NETWORKS Tae Ho Cho *1, Su Man Nam 2 *1 College of Software, Sungkyunkwan University, KOREA 2 College of Information and
More informationChapter 09: Caches. Lesson 04: Replacement policy
Chapter 09: Caches Lesson 04: Replacement policy 1 Objective Understand the replacement Policy Comparisons between write back and write through caches 2 Replacement policy 3 Replacement after eviction
More informationPerformance and cost effectiveness of caching in mobile access networks
Performance and cost effectiveness of caching in mobile access networks Jim Roberts (IRT-SystemX) joint work with Salah Eddine Elayoubi (Orange Labs) ICN 2015 October 2015 The memory-bandwidth tradeoff
More informationAnalytical Cache Replacement for Large Caches and Multiple Block Containers
Analytical Cache Replacement for Large Caches and Multiple Block Containers David Vengerov david.vengerov@oracle.com Garret Swart garret.swart@oracle.com Draft of 2011/02/14 14:48 Abstract An important
More informationSHARDS & Talus: Online MRC estimation and optimization for very large caches
SHARDS & Talus: Online MRC estimation and optimization for very large caches Nohhyun Park CloudPhysics, Inc. Introduction Efficient MRC Construction with SHARDS FAST 15 Waldspurger at al. Talus: A simple
More informationPerformance Evaluation of CCN
Performance Evaluation of CCN September 13, 2012 Donghyun Jang, Munyoung Lee, Eunsang Cho, Ted Taekyoung Kwon (Seoul National University), Byoung-Joon Lee, Myeong-Wuk Jang, Sang-Jun Moon (Samsung Electronics),
More informationNetwork Economics of SDN-Based Infrastructures: Can We Unlock Value Through ICN Multicast?
Network Economics of SDN-Based Infrastructures: Can We Unlock Value Through ICN Multicast? Vaggelis G. Douros, Janne Riihijärvi, Petri Mähönen Institute for Networked Systems, RWTH Aachen University Kackertstrasse
More informationVideo Conferencing with Content Centric Networking
Video Conferencing with Content Centric Networking Kai Zhao 1,2, Xueqing Yang 1, Xinming Ma 2 1. Information Engineering College, North China University of Water Rescources and Electric Power,Zhengzhou,china
More informationCache Less for More in Information- Centric Networks W. K. Chai, D. He, I. Psaras and G. Pavlou (presenter)
Cache Less for More in Information- Centric Networks W. K. Chai, D. He, I. Psaras and G. Pavlou (presenter) Department of Electronic & Electrical Engineering University College London London WC1E 6EA United
More informationOn Adaptive Pre-fetching and Caching the Contents in Content Centric Networking
On Adaptive Pre-fetching and Caching the Contents in Content Centric Networking Kyi Thar, Saeed Ullah, Doo Ho Lee, Choong Seon Hong Department of Computer Science and Engineering, Kyung Hee University,
More informationPersonal Content Caching for Mobiles
Personal Content Caching for Mobiles Roy Yates Shweta Jain () Ryoichi Shinkuma (Kyoto University) CNF Network Architecture Opportunistic Transmission & Storage Routing Store Cache popular content Movie1.
More informationBuffer Caching Algorithms for Storage Class RAMs
Issue 1, Volume 3, 29 Buffer Caching Algorithms for Storage Class RAMs Junseok Park, Hyunkyoung Choi, Hyokyung Bahn, and Kern Koh Abstract Due to recent advances in semiconductor technologies, storage
More informationMaster s Thesis 修士論文 論文題目 CACHE CONSISTENCY IN ICN: LEASE 5114FG21-6 THEINT THEINT MYO. Hidenori NAKAZATO. Supervisor 指導教員 年 7 月 1 9 日
Graduate School of Fundamental Science and Engineering Master s Thesis 修士論文 論文題目 CACHE CONSISTENCY IN ICN: LEASE Student ID 学籍番号 5114FG21-6 Name 氏名 THEINT THEINT MYO Supervisor 指導教員 Hidenori NAKAZATO 印
More informationA Popularity-based Caching Strategy for the Future Internet
Team researchers: Ikram Ud Din, Adib Habbal, and Nur Haryani Zakaria ITU Kaleidoscope 2016 ICTs for a Sustainable World A Popularity-based Caching Strategy for the Future Internet Suhaidi Hassan PhD SMIEEE
More informationNamed Data Networking Enabled WiFi in Challenged Communication Environments
Named Data Networking Enabled WiFi in Challenged Communication Environments 1 Anthony Guardado, 1 Zilong Ye, 1 Huiping Guo 2 Lei Liu, 2 Liguang Xie, 2 Akira Ito 1 California State University, Los Angeles
More informationOn the Feasibility of Prefetching and Caching for Online TV Services: A Measurement Study on
See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/220850337 On the Feasibility of Prefetching and Caching for Online TV Services: A Measurement
More informationCOSC 3406: COMPUTER ORGANIZATION
COSC 3406: COMPUTER ORGANIZATION Home-Work 5 Due Date: Friday, December 8 by 2.00 pm Instructions for submitting: Type your answers and send it by email or take a printout or handwritten (legible) on paper,
More informationWireless Caching: learning time- varying popularity
Wireless Caching: learning time- varying popularity Georgios Paschos Joint work with M. Leconte, L. Gkatzikis, M. Draief, S. Vassilaras, S. Chouvardas Huawei Technologies, Paris Tyrrhenian workshop - Livorno
More informationOperating Systems. Memory: replacement policies
Operating Systems Memory: replacement policies Last time caching speeds up data lookups if the data is likely to be re-requested again data structures for O(1)-lookup data source set-associative (hardware)
More informationA Seamless Content Delivery Scheme for Flow Mobility in Content Centric Network
A Seamless Content Delivery Scheme for Flow Mobility in Content Centric Network Rim Haw and Choong Seon Hong * Department of Computer Engineering Kyung Hee University Yong In, Korea {rhaw, cshong}@khu.ac.kr
More informationPartial Caching Scheme for Streaming Multimedia Data in Ad-hoc Network
, pp.106-110 http://dx.doi.org/10.14257/astl.2014.51.25 Partial Caching Scheme for Streaming Multimedia Data in Ad-hoc Network Backhyun Kim and Iksoo Kim 1 Faculty of Liberal Education, Incheon National
More informationSELECTING VOTES FOR ENERGY EFFICIENCY IN PROBABILISTIC VOTING-BASED FILTERING IN WIRELESS SENSOR NETWORKS USING FUZZY LOGIC
SELECTING VOTES FOR ENERGY EFFICIENCY IN PROBABILISTIC VOTING-BASED FILTERING IN WIRELESS SENSOR NETWORKS USING FUZZY LOGIC Su Man Nam and Tae Ho Cho College of Information and Communication Engineering,
More informationMaintaining Mutual Consistency for Cached Web Objects
Maintaining Mutual Consistency for Cached Web Objects Bhuvan Urgaonkar, Anoop George Ninan, Mohammad Salimullah Raunak Prashant Shenoy and Krithi Ramamritham Department of Computer Science, University
More informationLBM: A Low-power Buffer Management Policy for Heterogeneous Storage in Mobile Consumer Devices
LBM: A Low-power Buffer Management Policy for Heterogeneous Storage in Mobile Consumer Devices Hyojung Kang Department of Computer Science, Ewha University, Seoul, Korea Junseok Park Semiconductor Business,
More informationContent Poisoning in Named Data Networking: Comprehensive Characterization of real Deployment
Content Poisoning in Named Data Networking: Comprehensive Characterization of real Deployment Tan Nguyen, Xavier Marchal, Guillaume Doyen, Thibault Cholez and Rémi Cogranne ICD - STMR - UMR 628 CNRS Troyes
More informationENSF: ENERGY-EFFICIENT NEXT-HOP SELECTION METHOD USING FUZZY LOGIC IN PROBABILISTIC VOTING-BASED FILTERING SCHEME
ENSF: ENERGY-EFFICIENT NEXT-HOP SELECTION METHOD USING FUZZY LOGIC IN PROBABILISTIC VOTING-BASED FILTERING SCHEME Jae Kwan Lee 1 and Tae Ho Cho 2 1, 2 College of Information and Communication Engineering,
More informationA Buffer Replacement Algorithm Exploiting Multi-Chip Parallelism in Solid State Disks
A Buffer Replacement Algorithm Exploiting Multi-Chip Parallelism in Solid State Disks Jinho Seol, Hyotaek Shim, Jaegeuk Kim, and Seungryoul Maeng Division of Computer Science School of Electrical Engineering
More informationNetwork Traffic Anomaly Detection based on Ratio and Volume Analysis
190 Network Traffic Anomaly Detection based on Ratio and Volume Analysis Hyun Joo Kim, Jung C. Na, Jong S. Jang Active Security Technology Research Team Network Security Department Information Security
More informationContent Poisoning in Named Data Networking: Comprehensive Characterization of real Deployment
Content Poisoning in Named Data Networking: Comprehensive Characterization of real Deployment Tan Nguyen, Xavier Marchal, Guillaume Doyen, Thibault Cholez and Rémi Cogranne ICD - STMR - UMR 628 CNRS Troyes
More informationImproving object cache performance through selective placement
University of Wollongong Research Online Faculty of Informatics - Papers (Archive) Faculty of Engineering and Information Sciences 2006 Improving object cache performance through selective placement Saied
More informationTRACKING ELEPHANT FLOWS IN INTERNET BACKBONE TRAFFIC WITH AN FPGA-BASED CACHE
TRACKING ELEPHANT FLOWS IN INTERNET BACKBONE TRAFFIC WITH AN FPGA-BASED CACHE Martin Zadnik, Marco Canini, Andrew W. Moore, David J. Miller, Wei Li FIT, Brno Univ. of Technology, CZ DIST, University of
More informationRelative Reduced Hops
GreedyDual-Size: A Cost-Aware WWW Proxy Caching Algorithm Pei Cao Sandy Irani y 1 Introduction As the World Wide Web has grown in popularity in recent years, the percentage of network trac due to HTTP
More informationAMC: an adaptive multi-level cache algorithm in hybrid storage systems
CONCURRENCY AND COMPUTATION: PRACTICE AND EXPERIENCE Concurrency Computat.: Pract. Exper. (5) Published online in Wiley Online Library (wileyonlinelibrary.com)..5 SPECIAL ISSUE PAPER AMC: an adaptive multi-level
More informationFig 7.30 The Cache Mapping Function. Memory Fields and Address Translation
7-47 Chapter 7 Memory System Design Fig 7. The Mapping Function Example: KB MB CPU Word Block Main Address Mapping function The cache mapping function is responsible for all cache operations: Placement
More informationSDSS Dataset and SkyServer Workloads
SDSS Dataset and SkyServer Workloads Overview Understanding the SDSS dataset composition and typical usage patterns is important for identifying strategies to optimize the performance of the AstroPortal
More informationConsumer driven Adaptive Rate Control for Real-time Video Streaming in CCN/NDN
Consumer driven Adaptive Rate Control for Real-time Video Streaming in CCN/NDN Takahiro YONEDA, Ryota OHNISHI, Eiichi MURAMOTO(Presenter),, Panasonic Corporation Jeff Burke, UCLA Contact: muramoto.eiichi@jp.panasonic.com
More informationRouting and Forwarding in ntorrent using ndnsim
Routing and Forwarding in ntorrent using ndnsim Akshay Raman University of California, Los Angeles akshay.raman@cs.ucla.edu arxiv:1807.05061v1 [cs.ni] 22 Jun 2018 Abstract BitTorrent is a popular communication
More informationEnhancing Multi-Source Content Delivery in Content-Centric Networks with Fountain Coding
Enhancing Multi-Source Content Delivery in Content-Centric Networks with Fountain Coding George Parisis Univ. of Sussex, UK g.parisis@sussex.ac.uk Wei Koong Chai w.chai@ucl.ac.uk Vasilis Sourlas, v.sourlas@ucl.ac.uk
More informationTowards Line-Speed and Accurate On-line Popularity Monitoring on NDN Routers
Towards Line-Speed and Accurate On-line Monitoring on NDN Routers Huichen Dai, Yi Wang, Hao Wu, Jianyuan Lu, Bin Liu Tsinghua National Laboratory for Information Science and Technology Dept. of Computer
More informationArchitecture Tuning Study: the SimpleScalar Experience
Architecture Tuning Study: the SimpleScalar Experience Jianfeng Yang Yiqun Cao December 5, 2005 Abstract SimpleScalar is software toolset designed for modeling and simulation of processor performance.
More informationA Review on Mobile Ad Hoc Network Attacks with Trust Mechanism
A Review on Mobile Ad Hoc Network Attacks with Trust Mechanism categorized into two classes: active attacks and passive attacks. Rinki Bhati 1, Dr. Deepti Sharma 2 M-Tech Student, Department of CSE, Advance
More informationFinding a needle in Haystack: Facebook's photo storage
Finding a needle in Haystack: Facebook's photo storage The paper is written at facebook and describes a object storage system called Haystack. Since facebook processes a lot of photos (20 petabytes total,
More informationTOWARD PRIVACY PRESERVING AND COLLUSION RESISTANCE IN A LOCATION PROOF UPDATING SYSTEM
TOWARD PRIVACY PRESERVING AND COLLUSION RESISTANCE IN A LOCATION PROOF UPDATING SYSTEM R.Bhuvaneswari 1, V.Vijayalakshmi 2 1 M.Phil., Scholar, Bharathiyar Arts And Science College For Women, India 2 HOD
More informationSUMMERY, CONCLUSIONS AND FUTURE WORK
Chapter - 6 SUMMERY, CONCLUSIONS AND FUTURE WORK The entire Research Work on On-Demand Routing in Multi-Hop Wireless Mobile Ad hoc Networks has been presented in simplified and easy-to-read form in six
More informationDynamic TTL Assignment in Caching Meta Algorithms. and Study of the Effects on Caching. Named Data Networks
Dynamic TTL Assignment in Caching Meta Algorithms and Study of the Effects on Caching In Named Data Networks A Thesis Presented to the Faculty of the Department of Engineering Technology University of
More informationManagement of scalable video streaming in information centric networking
Multimed Tools Appl (2017) 76:21519 21546 DOI 10.1007/s11042-016-4008-8 Management of scalable video streaming in information centric networking Saeed Ullah 1 Kyi Thar 1 Choong Seon Hong 1 Received: 25
More informationCOMPUTER NETWORKS PERFORMANCE. Gaia Maselli
COMPUTER NETWORKS PERFORMANCE Gaia Maselli maselli@di.uniroma1.it Prestazioni dei sistemi di rete 2 Overview of first class Practical Info (schedule, exam, readings) Goal of this course Contents of the
More informationCOMPUTER NETWORK PERFORMANCE. Gaia Maselli Room: 319
COMPUTER NETWORK PERFORMANCE Gaia Maselli maselli@di.uniroma1.it Room: 319 Computer Networks Performance 2 Overview of first class Practical Info (schedule, exam, readings) Goal of this course Contents
More informationEnhancing Information Resilience in Disruptive Information-Centric Networks
1 Enhancing Information Resilience in Disruptive Information-Centric Networks Vasilis Sourlas Psaras, Onur Ascigil, Ioannis Psaras and George Pavlou ICCS-NTUA, GR. University College London, UK. Email:
More informationImproving Cache Performance
Improving Cache Performance Computer Organization Architectures for Embedded Computing Tuesday 28 October 14 Many slides adapted from: Computer Organization and Design, Patterson & Hennessy 4th Edition,
More informationPerformance Evaluation of Caching Policies in NDN - an ICN Architecture
Performance Evaluation of Caching Policies in NDN - an ICN Architecture Samar Shailendra, Senthilmurugan Sengottuvelan, Hemant Kumar Rath, Bighnaraj Panigrahi, Anantha Simha TCS Research & Innovation,
More informationCBM: A Cooperative Buffer Management for SSD
3 th International Conference on Massive Storage Systems and Technology (MSST 4) : A Cooperative Buffer Management for SSD Qingsong Wei, Cheng Chen, Jun Yang Data Storage Institute, A-STAR, Singapore June
More informationPublisher Mobility Support in Content Centric Networks
Publisher Mobility Support in Content Centric Networks Dookyoon Han, Munyoung Lee, Kideok Cho, Ted Taekyoung Kwon, and Yanghee Choi School of Computer Science and Engineering Seoul National University,
More informationA Proxy Caching Scheme for Continuous Media Streams on the Internet
A Proxy Caching Scheme for Continuous Media Streams on the Internet Eun-Ji Lim, Seong-Ho park, Hyeon-Ok Hong, Ki-Dong Chung Department of Computer Science, Pusan National University Jang Jun Dong, San
More informationarxiv: v3 [cs.ni] 3 May 2017
Modeling Request Patterns in VoD Services with Recommendation Systems Samarth Gupta and Sharayu Moharir arxiv:1609.02391v3 [cs.ni] 3 May 2017 Department of Electrical Engineering, Indian Institute of Technology
More informationThe Design and Implementation of a Next Generation Name Service for the Internet (CoDoNS) Presented By: Kamalakar Kambhatla
The Design and Implementation of a Next Generation Name Service for the Internet (CoDoNS) Venugopalan Ramasubramanian Emin Gün Sirer Presented By: Kamalakar Kambhatla * Slides adapted from the paper -
More informationEfficient Page Caching Algorithm with Prediction and Migration for a Hybrid Main Memory
Efficient Page Caching Algorithm with Prediction and Migration for a Hybrid Main Memory Hyunchul Seok, Youngwoo Park, Ki-Woong Park, and Kyu Ho Park KAIST Daejeon, Korea {hcseok, ywpark, woongbak}@core.kaist.ac.kr
More informationCFLRU:A A Replacement Algorithm for Flash Memory
CFLRU:A A Replacement Algorithm for Flash Memory CASES'06, October 23 25, 2006, Seoul, Korea. Copyright 2006 ACM 1-59593-543-6/06/0010 Yen-Ting Liu Outline Introduction CFLRU Algorithm Simulation Implementation
More informationOutlook. Background Swapping Contiguous Memory Allocation Paging Structure of the Page Table Segmentation Example: The Intel Pentium
Main Memory Outlook Background Swapping Contiguous Memory Allocation Paging Structure of the Page Table Segmentation Example: The Intel Pentium 2 Backgound Background So far we considered how to share
More informationNovel Hybrid Schemes Employing Packet Marking and Logging for IP Traceback. Basheer Al-Duwairi, Member, IEEE, and G. Manimaran, Member, IEEE
1 Novel Hybrid Schemes Employing Packet Marking and Logging for IP Traceback Basheer Al-Duwairi, Member, IEEE, and G. Manimaran, Member, IEEE Abstract Tracing DoS attacks that employ source address spoofing
More informationCache memory. Lecture 4. Principles, structure, mapping
Cache memory Lecture 4 Principles, structure, mapping Computer memory overview Computer memory overview By analyzing memory hierarchy from top to bottom, the following conclusions can be done: a. Cost
More informationNBM: An Efficient Cache Replacement Algorithm for Nonvolatile Buffer Caches
: An Efficient Cache Replacement Algorithm for Nonvolatile Buffer Caches JUNSEOK PARK and KERN KOH Seoul National University 56-1 Shillim-dong, Kwanak-gu, Seoul, 151-742 REPUBLIC OF KOREA HYUNKYOUNG CHOI
More informationIBM Research Report. Adaptive Caching Algorithms for Big Data Systems
RJ10531 (ALM1509-001) September 25, 2015 Computer Science IBM Research Report Adaptive Caching Algorithms for Big Data Systems Avrilia Floratou 1, Nimrod Megiddo 1, Navneet Potti 2, Fatma Özcan 1, Uday
More informationA METHOD FOR DETECTING FALSE POSITIVE AND FALSE NEGATIVE ATTACKS USING SIMULATION MODELS IN STATISTICAL EN- ROUTE FILTERING BASED WSNS
A METHOD FOR DETECTING FALSE POSITIVE AND FALSE NEGATIVE ATTACKS USING SIMULATION MODELS IN STATISTICAL EN- ROUTE FILTERING BASED WSNS Su Man Nam 1 and Tae Ho Cho 2 1 College of Information and Communication
More informationVirtual to physical address translation
Virtual to physical address translation Virtual memory with paging Page table per process Page table entry includes present bit frame number modify bit flags for protection and sharing. Page tables can
More informationMCBS: Matrix Computation Based Simulator of NDN
JOURNAL OF COMPUTERS, VOL. 9, NO. 9, SEPTEMBER 2014 2007 MCBS: Matrix Computation Based Simulator of NDN Xiaoke Jiang, Jun Bi, You Wang Institute for Network Sciences and Cyberspace, Tsinghua University
More information