SlideShare a Scribd company logo
1 of 21
Caching in Information Centric
Network (ICN)
Presented by: Priagung Khusumanegara
Outline
 Introduction
 Characteristics of caching in ICN
 Transparent
 Ubiquitous
 Fine Granularity
 Caching optimization in ICN
 Dimensioning
 Decision policy
 Challenges and future research2
Introduction
One of the important features of ICN is
caching
 Speed up content distribution
 Improve network resource utilization
Characteristics of caching in ICN
 Transparent
 Ubiquitous
 Fine granularity3
Transparent
 Making its routing and caching decisions on unified content
names, essentially making these names network aware.
 Several Challenges:
 Inconsistency between caching objective
 ICN should make reasonable choice of its caching objective to
balance between diverse traffic types.
 Cross-application competitive sharing of cache space
 Different types of traffic differ significantly in their population
scale, object size and object popularity.
 ICN have to be able to efficiently share cache resources
between different traffic types.
 Line rate operation of caches
 The cache management quite different from traditional disk-
based management.
4
Ubiquitous
 Topology of the cache network evolves from hierarchical trees to arbitrary
graphs.
 ICN more dynamics because its general cache network topology, ubiquity of
in network caches and volatility of cached content.
5
Traditional Caching System
Focus on
Hierarchical Tree
Evolution
Information Centric Network
Focus on
Arbitrary Graph
Fine Granularity
 Different options for the granularity of caching:
 File-level
o Caching individual files as transmitted through the network
o Typical size 1.5 Kb each – as proposed by CNN
 Chunk-level
o Caching information chunks
o An information object is split into a number of fixed-size
information chucks – as proposed by ICN
6
Fine Granularity (Cont’d)
Change of cache unit raises the following issues:
 Change of popularity
o Different chunks of a single file can have different access frequencies.
 Failure of independent reference assumption
o Traditional file-based caches are based on independent reference
model
o Requests for different chunks of the same file are often correlated, e.g.
in sequential order
 Opportunity for more efficient use of the cache space
o It possible to retrieve different parts of the same file from different
nodes, which speeds up the retrieval rate and improves the space
utilization.
7
Techniques for ICN performance
optimization
 Focus on:
– Cache dimensioning
– Cache decision policy
8
Cache Dimensioning
- Since ICN cache should operate at line rate, the cache
size that can be installed at each caching node is thus
limited.
- There are two issues that remain to be addressed:
 How large the cache space should be to have noticeable
performance improvement?
o Preferred to configure the cache size based on the router’s
performance disparity.
 How to allocate the storage resource across different cache nodes?
o Degree based allocation: the cache capacity allocated to a node
is proportional to its node degree.
9
Cache Decision Policy
 Cache decision policy
– It determines which objects are to be placed at
which cache nodes.
– Two kinds of cache decision policy
 Explicit cache coordination decision
 Implicit cache coordination
10
Explicit Cache Coordination
 Object access pattern, cache network topology and
each cache’s state as input for the calculation of the
placement position of each object.
 Common approaches can be classified into
three categories:
– Global
– Path
– Neighborhood
11
Explicit Cache Coordination
(Cont’d)
 Global coordination
– Involves all cache nodes
– Object placement based on network distance between
cache nodes and object access frequencies at each cache
node
 Path coordination
– Only involves the cache nodes along the path from the
request hit place to the requesting client
– e.g.: en-route web caching
12
Explicit Cache Coordination
(Cont’d)
 Neighborhood coordination
– Coordination takes place among a node’s
neighborhood.
– E.g.: Cooperative In-Network Caching (CINC)
13 Figure: The operation of coordination in network caching (CINC)
Implicit Cache Coordination
 Each node does not need to know the state
information of other cache nodes
 LCE (leave copy everywhere)
– Copy the object at each node along the
downloading path
– Disadvantage: Degrade the performance of the
network and underutilize some of the network
resources.
14
Implicit Cache Coordination
(Cont’d)
 Leave Copy Down (LCD):
– When a cache hit occurs, this scheme only
caches the object at the direct downstream node
– Avoid a large number of copies of the same
object15
Figure: LCD (Leave Copy Down)
Implicit Cache Coordination
(Cont’d)
 Move Copy Down (MCD):
– This scheme moves the object from the hit node
to its direct downstream node, and deletes the
object from the hit node.
16
Figure: MCD (Move Copy Down)
Implicit Cache Coordination
(Cont’d)
 Copy with Probability
- The requested object is copied with a given
probability p at each node along the returning
path
17
Figure: Copy with Probability
Implicit Cache Coordination
(Cont’d)
 Random Copy One
- The requested object is copied at one random
node along the returning path
18 Figure: Random Copy One
Implicit Cache Coordination
(Cont’d)
 Probability Cache
- The requested object is copied at each node with
a probability. But, for each node, the probability
varies.
19 Figure: Probability Cache
Correlation Between Cache
Decisions
- WAVE adjusts the number of chunks cached at
each node based on the file’s popularity
- When the number of requests for a file increases,
WAVE reacts with exponential increase in the
number of chucks cached for this file.
- A content router in WAVE explicitly sets the cache
indication mark
- Once the chunk is cached, the cache indication
mark is cleared.
20
Figure: Operation of WAVE
Challenges and Future Direction
 Cache object popularity
– Establish the chunk- level object popularity model from prior knowledge
– Measure the chunk-level object popularity directly
 Correlation between requests and correlation-based
cache decision
– What is the inherent correlation between different requests,
– How to model this correlation, and
– How to optimize the cache decision policy based on the request
correlation,
 ICN friendly network topology
– What kind of network topology is suitable for ICN network.
21

More Related Content

What's hot

A very good introduction to IPv6
A very good introduction to IPv6A very good introduction to IPv6
A very good introduction to IPv6Syed Arshad
 
Artificial Neural Networks Lect5: Multi-Layer Perceptron & Backpropagation
Artificial Neural Networks Lect5: Multi-Layer Perceptron & BackpropagationArtificial Neural Networks Lect5: Multi-Layer Perceptron & Backpropagation
Artificial Neural Networks Lect5: Multi-Layer Perceptron & BackpropagationMohammed Bennamoun
 
Deep Learning in Computer Vision
Deep Learning in Computer VisionDeep Learning in Computer Vision
Deep Learning in Computer VisionSungjoon Choi
 
Introduction to Router and Routing Basics
Introduction to Router and Routing BasicsIntroduction to Router and Routing Basics
Introduction to Router and Routing BasicsDarwish Ahmad
 
4 informed-search
4 informed-search4 informed-search
4 informed-searchMhd Sb
 
IP Address - IPv4 & IPv6
IP Address - IPv4 & IPv6IP Address - IPv4 & IPv6
IP Address - IPv4 & IPv6Adeel Rasheed
 
BGP Advance Technique by Steven & James
BGP Advance Technique by Steven & JamesBGP Advance Technique by Steven & James
BGP Advance Technique by Steven & JamesFebrian ‎
 
Network Address Translation (NAT)
Network Address Translation (NAT)Network Address Translation (NAT)
Network Address Translation (NAT)Joud Khattab
 
Cisco IPv6 Tutorial
Cisco IPv6 TutorialCisco IPv6 Tutorial
Cisco IPv6 Tutorialkriz5
 
Transitioning IPv4 to IPv6
Transitioning IPv4 to IPv6Transitioning IPv4 to IPv6
Transitioning IPv4 to IPv6Jhoni Guerrero
 
Convolutional neural networks
Convolutional neural networks Convolutional neural networks
Convolutional neural networks Roozbeh Sanaei
 
Waltz algorithm in artificial intelligence
Waltz algorithm in artificial intelligenceWaltz algorithm in artificial intelligence
Waltz algorithm in artificial intelligenceMinakshi Atre
 

What's hot (20)

Transportlayer tanenbaum
Transportlayer tanenbaumTransportlayer tanenbaum
Transportlayer tanenbaum
 
Named Data Networking
Named Data NetworkingNamed Data Networking
Named Data Networking
 
OSI 7 Layer Model
OSI 7 Layer ModelOSI 7 Layer Model
OSI 7 Layer Model
 
A very good introduction to IPv6
A very good introduction to IPv6A very good introduction to IPv6
A very good introduction to IPv6
 
Artificial Neural Networks Lect5: Multi-Layer Perceptron & Backpropagation
Artificial Neural Networks Lect5: Multi-Layer Perceptron & BackpropagationArtificial Neural Networks Lect5: Multi-Layer Perceptron & Backpropagation
Artificial Neural Networks Lect5: Multi-Layer Perceptron & Backpropagation
 
Deep Learning in Computer Vision
Deep Learning in Computer VisionDeep Learning in Computer Vision
Deep Learning in Computer Vision
 
Introduction to Router and Routing Basics
Introduction to Router and Routing BasicsIntroduction to Router and Routing Basics
Introduction to Router and Routing Basics
 
IPv6
IPv6IPv6
IPv6
 
4 informed-search
4 informed-search4 informed-search
4 informed-search
 
IP Address - IPv4 & IPv6
IP Address - IPv4 & IPv6IP Address - IPv4 & IPv6
IP Address - IPv4 & IPv6
 
BGP Advance Technique by Steven & James
BGP Advance Technique by Steven & JamesBGP Advance Technique by Steven & James
BGP Advance Technique by Steven & James
 
IPv6
IPv6IPv6
IPv6
 
Network Coding
Network CodingNetwork Coding
Network Coding
 
Network Address Translation (NAT)
Network Address Translation (NAT)Network Address Translation (NAT)
Network Address Translation (NAT)
 
Cisco IPv6 Tutorial
Cisco IPv6 TutorialCisco IPv6 Tutorial
Cisco IPv6 Tutorial
 
VIT 2-2014
VIT 2-2014VIT 2-2014
VIT 2-2014
 
Transitioning IPv4 to IPv6
Transitioning IPv4 to IPv6Transitioning IPv4 to IPv6
Transitioning IPv4 to IPv6
 
Convolutional neural networks
Convolutional neural networks Convolutional neural networks
Convolutional neural networks
 
Route Leak Prevension with BGP Community
Route Leak Prevension with BGP CommunityRoute Leak Prevension with BGP Community
Route Leak Prevension with BGP Community
 
Waltz algorithm in artificial intelligence
Waltz algorithm in artificial intelligenceWaltz algorithm in artificial intelligence
Waltz algorithm in artificial intelligence
 

Similar to Caching in Information Centric Network (ICN)

JPD1421 Content Caching and Scheduling in Wireless Networks With Elastic and...
JPD1421  Content Caching and Scheduling in Wireless Networks With Elastic and...JPD1421  Content Caching and Scheduling in Wireless Networks With Elastic and...
JPD1421 Content Caching and Scheduling in Wireless Networks With Elastic and...chennaijp
 
Survey paper _ lakshmi yasaswi kamireddy(651771619)
Survey paper _ lakshmi yasaswi kamireddy(651771619)Survey paper _ lakshmi yasaswi kamireddy(651771619)
Survey paper _ lakshmi yasaswi kamireddy(651771619)Lakshmi Yasaswi Kamireddy
 
2014 IEEE DOTNET NETWORKING PROJECT Content caching-and-scheduling-in-wireles...
2014 IEEE DOTNET NETWORKING PROJECT Content caching-and-scheduling-in-wireles...2014 IEEE DOTNET NETWORKING PROJECT Content caching-and-scheduling-in-wireles...
2014 IEEE DOTNET NETWORKING PROJECT Content caching-and-scheduling-in-wireles...IEEEFINALSEMSTUDENTSPROJECTS
 
A New Efficient Cache Replacement Strategy for Named Data Networking
A New Efficient Cache Replacement Strategy for Named Data NetworkingA New Efficient Cache Replacement Strategy for Named Data Networking
A New Efficient Cache Replacement Strategy for Named Data NetworkingIJCNCJournal
 
A NEW EFFICIENT CACHE REPLACEMENT STRATEGY FOR NAMED DATA NETWORKING
A NEW EFFICIENT CACHE REPLACEMENT STRATEGY FOR NAMED DATA NETWORKINGA NEW EFFICIENT CACHE REPLACEMENT STRATEGY FOR NAMED DATA NETWORKING
A NEW EFFICIENT CACHE REPLACEMENT STRATEGY FOR NAMED DATA NETWORKINGIJCNCJournal
 
OpenEBS; asymmetrical block layer in user-space breaking the million IOPS bar...
OpenEBS; asymmetrical block layer in user-space breaking the million IOPS bar...OpenEBS; asymmetrical block layer in user-space breaking the million IOPS bar...
OpenEBS; asymmetrical block layer in user-space breaking the million IOPS bar...MayaData
 
International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...ijcseit
 
Age-based Cooperative Caching in Information-Centric Networks
Age-based Cooperative Caching in Information-Centric NetworksAge-based Cooperative Caching in Information-Centric Networks
Age-based Cooperative Caching in Information-Centric NetworksShi Junxiao
 
MayaData Datastax webinar - Operating Cassandra on Kubernetes with the help ...
MayaData  Datastax webinar - Operating Cassandra on Kubernetes with the help ...MayaData  Datastax webinar - Operating Cassandra on Kubernetes with the help ...
MayaData Datastax webinar - Operating Cassandra on Kubernetes with the help ...MayaData Inc
 
Survey on caching and replication algorithm for content distribution in peer ...
Survey on caching and replication algorithm for content distribution in peer ...Survey on caching and replication algorithm for content distribution in peer ...
Survey on caching and replication algorithm for content distribution in peer ...ijcseit
 
Managing Multidimensional Historical
Managing Multidimensional HistoricalManaging Multidimensional Historical
Managing Multidimensional HistoricalArul Suju
 
content caching and scheduling in wireless networks with elastic and inelasti...
content caching and scheduling in wireless networks with elastic and inelasti...content caching and scheduling in wireless networks with elastic and inelasti...
content caching and scheduling in wireless networks with elastic and inelasti...swathi78
 
VIRTUAL CACHE & VIRTUAL WAN ACCELERATOR FUNCTION PLACEMENT FOR COST-EFFECTIVE...
VIRTUAL CACHE & VIRTUAL WAN ACCELERATOR FUNCTION PLACEMENT FOR COST-EFFECTIVE...VIRTUAL CACHE & VIRTUAL WAN ACCELERATOR FUNCTION PLACEMENT FOR COST-EFFECTIVE...
VIRTUAL CACHE & VIRTUAL WAN ACCELERATOR FUNCTION PLACEMENT FOR COST-EFFECTIVE...IJCNCJournal
 
Ijmer 46068390
Ijmer 46068390Ijmer 46068390
Ijmer 46068390IJMER
 
Load balancing in Content Delivery Networks in Novel Distributed Equilibrium
Load balancing in Content Delivery Networks in Novel Distributed EquilibriumLoad balancing in Content Delivery Networks in Novel Distributed Equilibrium
Load balancing in Content Delivery Networks in Novel Distributed EquilibriumIJMER
 
Selective placement of caches for hash based off-path caching in icn slides
Selective placement of caches for hash based off-path caching in icn slidesSelective placement of caches for hash based off-path caching in icn slides
Selective placement of caches for hash based off-path caching in icn slidesAnshuman Kalla
 
Cache performance analysis of virtualized router on virtual content centric n...
Cache performance analysis of virtualized router on virtual content centric n...Cache performance analysis of virtualized router on virtual content centric n...
Cache performance analysis of virtualized router on virtual content centric n...ijngnjournal
 

Similar to Caching in Information Centric Network (ICN) (20)

Cc
CcCc
Cc
 
JPD1421 Content Caching and Scheduling in Wireless Networks With Elastic and...
JPD1421  Content Caching and Scheduling in Wireless Networks With Elastic and...JPD1421  Content Caching and Scheduling in Wireless Networks With Elastic and...
JPD1421 Content Caching and Scheduling in Wireless Networks With Elastic and...
 
Survey paper _ lakshmi yasaswi kamireddy(651771619)
Survey paper _ lakshmi yasaswi kamireddy(651771619)Survey paper _ lakshmi yasaswi kamireddy(651771619)
Survey paper _ lakshmi yasaswi kamireddy(651771619)
 
2014 IEEE DOTNET NETWORKING PROJECT Content caching-and-scheduling-in-wireles...
2014 IEEE DOTNET NETWORKING PROJECT Content caching-and-scheduling-in-wireles...2014 IEEE DOTNET NETWORKING PROJECT Content caching-and-scheduling-in-wireles...
2014 IEEE DOTNET NETWORKING PROJECT Content caching-and-scheduling-in-wireles...
 
A New Efficient Cache Replacement Strategy for Named Data Networking
A New Efficient Cache Replacement Strategy for Named Data NetworkingA New Efficient Cache Replacement Strategy for Named Data Networking
A New Efficient Cache Replacement Strategy for Named Data Networking
 
A NEW EFFICIENT CACHE REPLACEMENT STRATEGY FOR NAMED DATA NETWORKING
A NEW EFFICIENT CACHE REPLACEMENT STRATEGY FOR NAMED DATA NETWORKINGA NEW EFFICIENT CACHE REPLACEMENT STRATEGY FOR NAMED DATA NETWORKING
A NEW EFFICIENT CACHE REPLACEMENT STRATEGY FOR NAMED DATA NETWORKING
 
Lecture2
Lecture2Lecture2
Lecture2
 
OpenEBS; asymmetrical block layer in user-space breaking the million IOPS bar...
OpenEBS; asymmetrical block layer in user-space breaking the million IOPS bar...OpenEBS; asymmetrical block layer in user-space breaking the million IOPS bar...
OpenEBS; asymmetrical block layer in user-space breaking the million IOPS bar...
 
International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...
 
Age-based Cooperative Caching in Information-Centric Networks
Age-based Cooperative Caching in Information-Centric NetworksAge-based Cooperative Caching in Information-Centric Networks
Age-based Cooperative Caching in Information-Centric Networks
 
MayaData Datastax webinar - Operating Cassandra on Kubernetes with the help ...
MayaData  Datastax webinar - Operating Cassandra on Kubernetes with the help ...MayaData  Datastax webinar - Operating Cassandra on Kubernetes with the help ...
MayaData Datastax webinar - Operating Cassandra on Kubernetes with the help ...
 
Survey on caching and replication algorithm for content distribution in peer ...
Survey on caching and replication algorithm for content distribution in peer ...Survey on caching and replication algorithm for content distribution in peer ...
Survey on caching and replication algorithm for content distribution in peer ...
 
Managing Multidimensional Historical
Managing Multidimensional HistoricalManaging Multidimensional Historical
Managing Multidimensional Historical
 
content caching and scheduling in wireless networks with elastic and inelasti...
content caching and scheduling in wireless networks with elastic and inelasti...content caching and scheduling in wireless networks with elastic and inelasti...
content caching and scheduling in wireless networks with elastic and inelasti...
 
An efficient multi-level cache system for geometrically interconnected many-...
An efficient multi-level cache system for geometrically  interconnected many-...An efficient multi-level cache system for geometrically  interconnected many-...
An efficient multi-level cache system for geometrically interconnected many-...
 
VIRTUAL CACHE & VIRTUAL WAN ACCELERATOR FUNCTION PLACEMENT FOR COST-EFFECTIVE...
VIRTUAL CACHE & VIRTUAL WAN ACCELERATOR FUNCTION PLACEMENT FOR COST-EFFECTIVE...VIRTUAL CACHE & VIRTUAL WAN ACCELERATOR FUNCTION PLACEMENT FOR COST-EFFECTIVE...
VIRTUAL CACHE & VIRTUAL WAN ACCELERATOR FUNCTION PLACEMENT FOR COST-EFFECTIVE...
 
Ijmer 46068390
Ijmer 46068390Ijmer 46068390
Ijmer 46068390
 
Load balancing in Content Delivery Networks in Novel Distributed Equilibrium
Load balancing in Content Delivery Networks in Novel Distributed EquilibriumLoad balancing in Content Delivery Networks in Novel Distributed Equilibrium
Load balancing in Content Delivery Networks in Novel Distributed Equilibrium
 
Selective placement of caches for hash based off-path caching in icn slides
Selective placement of caches for hash based off-path caching in icn slidesSelective placement of caches for hash based off-path caching in icn slides
Selective placement of caches for hash based off-path caching in icn slides
 
Cache performance analysis of virtualized router on virtual content centric n...
Cache performance analysis of virtualized router on virtual content centric n...Cache performance analysis of virtualized router on virtual content centric n...
Cache performance analysis of virtualized router on virtual content centric n...
 

More from Lippo Group Digital

Behavior-Based Authentication System Based on Smartphone Life-Logs Data
Behavior-Based Authentication System Based on Smartphone Life-Logs DataBehavior-Based Authentication System Based on Smartphone Life-Logs Data
Behavior-Based Authentication System Based on Smartphone Life-Logs DataLippo Group Digital
 
A web based iptv content syndication system for personalized content guide
A web based iptv content syndication system for personalized content guideA web based iptv content syndication system for personalized content guide
A web based iptv content syndication system for personalized content guideLippo Group Digital
 
Time-based DDoS Detection and Mitigation for SDN Controller
Time-based DDoS Detection and Mitigation for SDN ControllerTime-based DDoS Detection and Mitigation for SDN Controller
Time-based DDoS Detection and Mitigation for SDN ControllerLippo Group Digital
 
Profiler for Smartphone Users Interests Using Modified Hierarchical Agglomera...
Profiler for Smartphone Users Interests Using Modified Hierarchical Agglomera...Profiler for Smartphone Users Interests Using Modified Hierarchical Agglomera...
Profiler for Smartphone Users Interests Using Modified Hierarchical Agglomera...Lippo Group Digital
 
Analisis performa kecepatan mapreduce pada hadoop menggunakan tcp packet flow...
Analisis performa kecepatan mapreduce pada hadoop menggunakan tcp packet flow...Analisis performa kecepatan mapreduce pada hadoop menggunakan tcp packet flow...
Analisis performa kecepatan mapreduce pada hadoop menggunakan tcp packet flow...Lippo Group Digital
 
Analisa pengaruh block size pada hdfs terhadap kecepatan
Analisa pengaruh block size pada hdfs terhadap kecepatanAnalisa pengaruh block size pada hdfs terhadap kecepatan
Analisa pengaruh block size pada hdfs terhadap kecepatanLippo Group Digital
 

More from Lippo Group Digital (13)

Behavior-Based Authentication System Based on Smartphone Life-Logs Data
Behavior-Based Authentication System Based on Smartphone Life-Logs DataBehavior-Based Authentication System Based on Smartphone Life-Logs Data
Behavior-Based Authentication System Based on Smartphone Life-Logs Data
 
Domain specific IoT
Domain specific IoTDomain specific IoT
Domain specific IoT
 
Feature Selection
Feature Selection Feature Selection
Feature Selection
 
Fall detection
Fall detectionFall detection
Fall detection
 
The Cognitive Net is Coming
The Cognitive Net is ComingThe Cognitive Net is Coming
The Cognitive Net is Coming
 
The future internet web 3.0
The future internet  web 3.0The future internet  web 3.0
The future internet web 3.0
 
A web based iptv content syndication system for personalized content guide
A web based iptv content syndication system for personalized content guideA web based iptv content syndication system for personalized content guide
A web based iptv content syndication system for personalized content guide
 
Time-based DDoS Detection and Mitigation for SDN Controller
Time-based DDoS Detection and Mitigation for SDN ControllerTime-based DDoS Detection and Mitigation for SDN Controller
Time-based DDoS Detection and Mitigation for SDN Controller
 
Distance function
Distance functionDistance function
Distance function
 
Decision tree and random forest
Decision tree and random forestDecision tree and random forest
Decision tree and random forest
 
Profiler for Smartphone Users Interests Using Modified Hierarchical Agglomera...
Profiler for Smartphone Users Interests Using Modified Hierarchical Agglomera...Profiler for Smartphone Users Interests Using Modified Hierarchical Agglomera...
Profiler for Smartphone Users Interests Using Modified Hierarchical Agglomera...
 
Analisis performa kecepatan mapreduce pada hadoop menggunakan tcp packet flow...
Analisis performa kecepatan mapreduce pada hadoop menggunakan tcp packet flow...Analisis performa kecepatan mapreduce pada hadoop menggunakan tcp packet flow...
Analisis performa kecepatan mapreduce pada hadoop menggunakan tcp packet flow...
 
Analisa pengaruh block size pada hdfs terhadap kecepatan
Analisa pengaruh block size pada hdfs terhadap kecepatanAnalisa pengaruh block size pada hdfs terhadap kecepatan
Analisa pengaruh block size pada hdfs terhadap kecepatan
 

Recently uploaded

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 

Recently uploaded (20)

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 

Caching in Information Centric Network (ICN)

  • 1. Caching in Information Centric Network (ICN) Presented by: Priagung Khusumanegara
  • 2. Outline  Introduction  Characteristics of caching in ICN  Transparent  Ubiquitous  Fine Granularity  Caching optimization in ICN  Dimensioning  Decision policy  Challenges and future research2
  • 3. Introduction One of the important features of ICN is caching  Speed up content distribution  Improve network resource utilization Characteristics of caching in ICN  Transparent  Ubiquitous  Fine granularity3
  • 4. Transparent  Making its routing and caching decisions on unified content names, essentially making these names network aware.  Several Challenges:  Inconsistency between caching objective  ICN should make reasonable choice of its caching objective to balance between diverse traffic types.  Cross-application competitive sharing of cache space  Different types of traffic differ significantly in their population scale, object size and object popularity.  ICN have to be able to efficiently share cache resources between different traffic types.  Line rate operation of caches  The cache management quite different from traditional disk- based management. 4
  • 5. Ubiquitous  Topology of the cache network evolves from hierarchical trees to arbitrary graphs.  ICN more dynamics because its general cache network topology, ubiquity of in network caches and volatility of cached content. 5 Traditional Caching System Focus on Hierarchical Tree Evolution Information Centric Network Focus on Arbitrary Graph
  • 6. Fine Granularity  Different options for the granularity of caching:  File-level o Caching individual files as transmitted through the network o Typical size 1.5 Kb each – as proposed by CNN  Chunk-level o Caching information chunks o An information object is split into a number of fixed-size information chucks – as proposed by ICN 6
  • 7. Fine Granularity (Cont’d) Change of cache unit raises the following issues:  Change of popularity o Different chunks of a single file can have different access frequencies.  Failure of independent reference assumption o Traditional file-based caches are based on independent reference model o Requests for different chunks of the same file are often correlated, e.g. in sequential order  Opportunity for more efficient use of the cache space o It possible to retrieve different parts of the same file from different nodes, which speeds up the retrieval rate and improves the space utilization. 7
  • 8. Techniques for ICN performance optimization  Focus on: – Cache dimensioning – Cache decision policy 8
  • 9. Cache Dimensioning - Since ICN cache should operate at line rate, the cache size that can be installed at each caching node is thus limited. - There are two issues that remain to be addressed:  How large the cache space should be to have noticeable performance improvement? o Preferred to configure the cache size based on the router’s performance disparity.  How to allocate the storage resource across different cache nodes? o Degree based allocation: the cache capacity allocated to a node is proportional to its node degree. 9
  • 10. Cache Decision Policy  Cache decision policy – It determines which objects are to be placed at which cache nodes. – Two kinds of cache decision policy  Explicit cache coordination decision  Implicit cache coordination 10
  • 11. Explicit Cache Coordination  Object access pattern, cache network topology and each cache’s state as input for the calculation of the placement position of each object.  Common approaches can be classified into three categories: – Global – Path – Neighborhood 11
  • 12. Explicit Cache Coordination (Cont’d)  Global coordination – Involves all cache nodes – Object placement based on network distance between cache nodes and object access frequencies at each cache node  Path coordination – Only involves the cache nodes along the path from the request hit place to the requesting client – e.g.: en-route web caching 12
  • 13. Explicit Cache Coordination (Cont’d)  Neighborhood coordination – Coordination takes place among a node’s neighborhood. – E.g.: Cooperative In-Network Caching (CINC) 13 Figure: The operation of coordination in network caching (CINC)
  • 14. Implicit Cache Coordination  Each node does not need to know the state information of other cache nodes  LCE (leave copy everywhere) – Copy the object at each node along the downloading path – Disadvantage: Degrade the performance of the network and underutilize some of the network resources. 14
  • 15. Implicit Cache Coordination (Cont’d)  Leave Copy Down (LCD): – When a cache hit occurs, this scheme only caches the object at the direct downstream node – Avoid a large number of copies of the same object15 Figure: LCD (Leave Copy Down)
  • 16. Implicit Cache Coordination (Cont’d)  Move Copy Down (MCD): – This scheme moves the object from the hit node to its direct downstream node, and deletes the object from the hit node. 16 Figure: MCD (Move Copy Down)
  • 17. Implicit Cache Coordination (Cont’d)  Copy with Probability - The requested object is copied with a given probability p at each node along the returning path 17 Figure: Copy with Probability
  • 18. Implicit Cache Coordination (Cont’d)  Random Copy One - The requested object is copied at one random node along the returning path 18 Figure: Random Copy One
  • 19. Implicit Cache Coordination (Cont’d)  Probability Cache - The requested object is copied at each node with a probability. But, for each node, the probability varies. 19 Figure: Probability Cache
  • 20. Correlation Between Cache Decisions - WAVE adjusts the number of chunks cached at each node based on the file’s popularity - When the number of requests for a file increases, WAVE reacts with exponential increase in the number of chucks cached for this file. - A content router in WAVE explicitly sets the cache indication mark - Once the chunk is cached, the cache indication mark is cleared. 20 Figure: Operation of WAVE
  • 21. Challenges and Future Direction  Cache object popularity – Establish the chunk- level object popularity model from prior knowledge – Measure the chunk-level object popularity directly  Correlation between requests and correlation-based cache decision – What is the inherent correlation between different requests, – How to model this correlation, and – How to optimize the cache decision policy based on the request correlation,  ICN friendly network topology – What kind of network topology is suitable for ICN network. 21