SlideShare a Scribd company logo
1 of 9
Download to read offline
Jan Zizka et al. (Eds) : CCSEIT, AIAP, DMDB, MoWiN, CoSIT, CRIS, SIGL, ICBB, CNSA-2016
pp. 175–183, 2016. © CS & IT-CSCP 2016 DOI : 10.5121/csit.2016.60614
ENHANCED PROTOCOL FOR WIRELESS
CONTENT-CENTRIC NETWORK
Chan-Min Park1
, Rana Asif Rehman2
, Tran Dinh Hieu2
, Byung-Seo Kim3
1
Graduate School of Smart City Science Management,
Hongik University, Sejong, Republic of Korea
walkinpcm@gmail.com
2
Dept. of Electronics and Computer Engineering,
Hongik University, Sejong, Republic of Korea
asifrehman7@gmail.com, trandinhhieu1989@gmail.com
3
Dept. of Computer and Information Communication Engineering,
Hongik University, Sejong, Republic of Korea
jsnbs@hongik.ac.kr
ABSTRACT
Recently, Content-Centric Networking (CCN) was introduced and is expected as a new concept
of future internet architecture. Even though CCN is initially studied for wired networks,
recently, it is also studied for wireless environment. In this paper, we discuss improvement
method for efficient content flooding over wireless CCNs. The proposed scheme of this paper
use MAC Address of nodes when Interest and Data Packet are forwarded in order to limit the
area of flooding of packets. The proposed protocol not only reduces the spread of Data packets,
but also offers priority of forwarding to nodes of shortest path. As a consequence, it reduce
content download time which is proved by extensive simulations.
KEYWORDS
Network Protocols, CCN, Future Internet, Protocol, Wireless.
1. INTRODUCTION
As mobile communication devices such as smartphones are widely used and rapidly spread out,
so that peoples are easily connected through Internet, which is so-called Internet-of-People (IoP).
Furthermore, such IoP not only increases tremendous of individuals data traffics, but also
requests lots of huge contents such as video and music from content servers. Even though current
Internet architecture provides efficiently end-to-end or host-to-host communications, it has been
troubled to deal with user’s mobility environment and services of aforementioned massive
contents provided to unspecified number of users. Particularly, due to popularity of video
streaming services such as TED and YouTube, more video-like content traffics are flooded over
the networks. In such video streaming services, many users request even same content in a
different time to same content server which might be located far from their locations. For
example, let’s assume that there is content server in U.S. and there are 10 people in Korea to
176 Computer Science & Information Technology (CS & IT)
request the content in a different time and different area. In this case, the content server will send
same content 10 times from U.S. to Korea. This is very inefficient way to provide content. In
order efficiently to request and provide the content itself, Content Centric Network (CCN)
concept has been proposed in year 2009 by Van Jacobson [1]. In CCN, when the first content is
delivered, we allow some server or router in Korea to store the content. Therefore, the second
user’s request on the same content can be provided from the nearby server or router, not far from
server in U.S. Furthermore, CCN proposes to use a content name to request/distribute content
instead of using IP address. That is, while current Internet focuses on “where to get” using IP
address, CCN focuses on “what to get” using content name itself.
Even though initial studies for CCN have been conducted on the wired networks, recent studies
moves to CCN-based wireless networks and is actively being conducted [2]-[10] because as
mentioned earlier, people enjoys contents through smart handheld devices while they are moving.
However, the research on wireless CCN is still early-state and there are many issues to be
resolved. One of issue is long delay to download contents because of broadcasting and flooding-
based transmissions adopted by wireless CCN. In this paper, we focus on how to reduce flooded
traffics in wireless CCN in order to reduce download time of contents. To resolve the issue, we
propose a novel protocol to reduce the number of content request messages, named Interest
packet, flooded over the networks. As a result, the proposed protocol reduces collisions and
wasted time in wireless CCN.
In Section 2, the fundamentals of CCN and some prior arts related with wireless CCNs are
introduced. In Section 3, after motivation of this research is introduced, the proposed protocol is
described. In Section 4, the proposed protocol is evaluated in terms of the content download time
and conclusions are made in Section 5.
2. PRIOR ART
CCN is composed of three devices and three packets [1]. Three devices are consumer, provider,
and intermediate nodes, and three packets are Interest, Data, and Announcement packets. Each
device consists of three components: Content Store (CS), Pending Interest Table (PIT), and
Forwarding Information Base (FIB). A consumer requests a content by sending an Interest packet
and the Interest packet is flooded over a network by all intermediate nodes. Once receiving the
Interest packet, a node to check its CS if it has the content. If it has, it sends Data packets in the
manner of broadcasting and it becomes a provider. If it doesn’t, it records the information of
Interest packet in its PIT and broadcasts the Interest packet to Networks. Therefore, any node that
has request content can be a provider which is a content server in terms of conventional IP-based
networks. When receiving a Data packet, then it checks PIT to ensure any node requested the
content before. If yes, it broadcasts the Data packet. Otherwise, it discards the packet. In CCN, a
provider can broadcast announcement packet to let nodes in network know specific content that
the node has in CS.
After the concept of CCN was proposed, studies on wireless CCN have been actively performed
[2]-[10]. Enhanced-Content-centric multiHop wireless NETwork (E-CHANET) is designed for
wireless networks adopting CCN concept [2]. In E-CHANET, Announcement packet and FIB
component are removed from the system. Instead, to cope with erroneous wireless channel, it
uses Interest-Data-based two-way handshake performed between consumer and provider.
Therefore, every Data packet transmission is requested by one Interest packet. If there is a lost
Computer Science & Information Technology (CS & IT) 177
Data packet, same Interest packet is retransmitted. Calculating wait-time for receiving the
requested Data packet and handoff method between different providers are also designed. The
CCN communication method is also applied to vehicular networks [4]. CarSpeak enables a car to
query and access sensory information captured by other cars in a manner similar to a way to
request a content in content-centric approach. Authors in [4] try to solve packet loss problem
caused by node mobility in CCN-based MANETs. In [4], both of broadcast and unicast are used
for the transmissions of Interest packets, and additional function is added which is to validate if
the next hop node is available when a node receives Interest or Data packet. Flooding issue in
CCN has been studied in [5][6]. In [5], the shortest hop count is found by flooding Interest
packets and then Data packet is flooded back to consumer within the hop count. In [6], the
authors proposed a new scheme called Neighborhood-Aware Interest Forwarding (NAIF) for
NDN-based mobile ad hoc networks. This scheme basically reduces the flooding overhead in the
network. In which, the intermediate node locally decide to propagate or drop the received Interest
packet based on the forwarding rate. Authors in [7] propose a scheme for multihop based wireless
CCN. Two additional packets, called EFS-ACK and EFS are also utilized in addition to the
Interest and Data packets. In [8], the authors present an energy aware forwarding scheme for
multihop wireless ad hoc networks. In which, the packets are forwarded based on node's residual
energy. Authors in [9] propose forwarding strategies (i.e. BF, PAF) for wireless CCN ad hoc
networks. These schemes are deeply analyze and well evaluated. Furthermore, the authors also
highlight the advantages and shortcoming of both approaches. Kim et al., in [10], present a novel
scheme, named AIRDrop in which communication is based on unicast manner. Proposed
AIRDrop scheme also takes into account the extra tables and buffers during its communication
operations.
Figure. 1. Revised packet formats for the proposed protocol: (a) Interest packet and (b) Data packet
3. PROPOSED PROTOCOL
3.1. Motivation
Although previously proposed protocols for CCN-based wireless networks provide advantages
for delivering contents, their performance is still struggling in terms of content download time.
One of the reasons is inefficient Data packet forwarding mechanism. In wireless environments,
using broadcasting manner, the direction of packet flows cannot be controlled, so that too much
flooding causes delays to download contents. Since many wireless routing protocols uses
unicasting and IP addresses, so that packet’s flow can be controlled using IP addresses. However,
because wireless CCNs do not use IP address and use broadcasting address for MAC protocol, it
MACAddrList
HopCnt
MACAddrList
MaxHopCnt
(a) (b)
178 Computer Science & Information Technology (CS & IT)
is hard to restrict flooding area and control the content flows. On the other hand, totally removing
flooding in wireless CCNs also removes advantage of CCNs’ nature which is to spread contents
over the networks for possible upcoming content request. Therefore, the objective of this paper is
to propose a protocol for wireless CCNs which not only limits flooding of Data packets in a
certain range over the networks, but also speeds up content download time using a shortest path
from a provider to a consumer.
In the proposed protocol, the way to forward Interest packet is same as that of E-CHANET.
However, whenever nodes forwards the packet, they add their MAC addresses in the packet.
When the list of MAC addresses of the Interest packet arriving firstly at a provider, it will be used
as the shortest path for Data packet’s forwarding. Furthermore, since nodes in the list are allowed
to have priorities to access the channel, Data packets can be arrived at a consumer faster
comparing to the conventional wireless CCNs. Unlike common unicasting routing protocols used
in wireless ad-hoc networks, the Data packets is not forwarded only by the nodes in the list. The
packet is also forwarded in some area of the nodes in the list. That is, the Data packets are
flooded in a restricted area around the shortest path. Therefore, it achieves not only a better
content download time, but also flooding of Data packets.
3.2. New Frames
In the proposed protocol, Interest and Data packets’ formats of E-CHANET are modified as
shown in Fig.1. As shown in Fig. 1(a), for the Interest packet of the proposed protocol, one field,
called MACAddrList, is added at the end of the packet. This field includes MAC addresses of
intermediate nodes between a consumer and a provider. When a node receives an Interest packet
and decides to forward it, it adds its MAC address in the field. Therefore, MAC addresses are
accumulated in the field as the Interest packet is forwarded to a Provider, so that the size of the
field is varied according to the number of nodes forwarding the Interest packet before it arrives at
a provider. This filed is also used for Data packet as shown in Fig. 1(b). The list of addresses in
the field of Interest packet is copied to the field of Data packet by a provider before the Data
packet is transmitted. While a node adds its MAC address into MACAddrList field when
receiving an Interest packet, it removes its MAC address from the field of Data packet when it
receives the data packet and its address is in the field. MaxHopCnt is the number of MAC
addresses indicating how many nodes the Interest packet have come through from a consumer to
the provider. HopCnt field in Data packet indicates how many hops the Data packet can be
forwarded. That is, this limits forwarding Data packet unnecessary further. When a node receives
a Data packet, it recalculates HopCnt which is explained in detail in Section 3.3. HopCnt is
differently calculated depend on whether or not the node itself is in MACAddrList.
3.3. Operation of the proposed protocol
In this section, operations of the protocol are explained in two parts: cases when a node receives
Interest packet and Data packet.
Process when a node receives an Interest packet.
The procedure of the proposed protocol when a node receiving an Interest packet is shown in Fig.
2.
Computer Science & Information Technology (CS & IT) 179
Figure. 2. Procedure of the proposed protocol when a node receives Interest packet
When a node receives an Interest packet, it performs the process defined from conventional
wireless CCN such as E-CHANET. That is, it checks CS and PIT and decides whether or not to
forward the packet. If the node acts as a relay node and the received Interest packet needs to be
forwarded, it add the last 24bits of its MAC address to MACAddrList field in the received Interest
packet and forwards the packet to the neighbours. If the packet is already received before, the
node discards the packet.
If the node becomes a provider (that means it has the requested contents in its CS), it checks if it
already received an Interest packet requesting same content and nonce number. If it did, it
discards the packet. Otherwise, it records the first packet requesting the content with the nonce is
received, and then at first, it copies the list in MACAddrList field in the Interest packet to
MACAddrList field in Data packet to be sent. Secondly, it set HopCnt field to N times the number
of MAC addresses in the field. Finally, it sends the Data packet to Consumer.
In the process, when a provider receives an Interest packet, it sets MaxHopCnt to N x the number
of MAC addresses in MACAddrList of the Interest packet.
Process when a node receives a Data packet.
When a node receives Data packet, it processes conventional CCN process. Then it checks if it
need to forward the received Data packet. If it does not need to forward the packet, it discards the
packet. If it need to forward it, but HopCnt is 0, it discards the packet. Otherwise, the node
checks if there is its own MAC address in the MACAddrList of the Data packet. If there is,
HopCnt of the Data packet is set to MaxHopCnt and the node’s own MAC address is removed
from MACAddrList of the packet. In addition, after choosing random number between 0 and Ws,
Receive
Interest
Operate basic
CCN procedure
Forward?
Add MAC Address into
MACAddrList of Interest
packet
Forward Interest
Discard
Interest
packet
Yes
No Am I
Provider?
No
Yes
Copy MACAddrList from Interest
packet to Data packet
HopCnt = MaxhopCnt =
N x # of MAC addresses in the list
Send Data packet
Is it the 1st
Interest?
No
Yes
180 Computer Science & Information Technology (CS & IT)
it sets its deferring time, DeferT, to the random number x slot time, SlotT. After waiting DeferT,
it forwards the Data packet to neighbours. If there isn’t its own MAC address in the
MACAddrList of the Data packet, the node checks if HopCnt of the packet equals to 1. If it is,
HopCnt is set to 0. Otherwise, HopCnt is set to the integer that is not higher than root of HopCnt
of the packet. After choosing random number between 0 and Wn, it sets its DeferT, to the random
number x SlotT. After waiting DeferT, the packet is forwarded to the neighbours.
The proposed protocol provides two unique characteristics to efficiently forward Data packets.
The first characteristic is to limit the Data packet’s flooding by exponentially reducing HopCnt as
explained in Step 4-2a. If a node receiving the Data packet coming from the non-shortest path,
the Data packet is forwarded within number of hops. If it is coming from the shortest path, its
Data packet is flooded as many hops as MaxHopCnt as explained in Step 4-1a. Therefore, it
maintains an advantage of conventional CCN’s flooding as well as prevents from unnecessary
packet flooding. The second characteristic is to give transmission priority to nodes on the shortest
path as explained in Step 4-1c and 4-2c. In conventional wireless CCNs, since all data packets are
broadcasted in MAC payer, there is no retransmissions and backoff time increase. Because of
this, it causes lots of collisions due to concurrent transmissions. Therefore, to resolve concurrent
transmissions, CCN layer provides Deferred Time which a node waits random time before
transmission. In this case, to give better transmission opportunity to the nodes along with the
shortest path, the proposed protocol allows them to choose random number from the smaller
range of numbers (0~Ws) than other nodes. The other nodes choose the random number from the
wider range of numbers (0~Wn). As a result, nodes on the shortest path have the higher
transmission opportunities than others.
Figure. 3. Network Topology for the simulations
Consumer Provider
Computer Science & Information Technology (CS & IT) 181
Figure. 4. Average content download time as a function of the distance between a consumer-provider pair
4. PERFORMANCE EVALUATIONS
In this section, the proposed protocol is comparatively evaluated with E-CHANET-based
protocol. For evaluation studies, we have used ndnSIM [10] software module that is based on
Network Simulator-3 (NS-3) version 3.16. In the simulations, one content consists of 100 packets
and payload length of a data packet is set to 1200 bytes. Physical layer transmission rate is set to
6Mbps and 5GHz-carrier frequency-based IEEE802.11a standard is adopted. Medium access
control protocol is based on IEEE802.11e standard. For the channel model, log normal path loss
model with path loss exponent 3 is used. The simulations results are collected from 100 times
simulations and one simulation completed when a consumer receives all 100 chunks packets from
a provider.
The performances are evaluated as functions of network sizes by varying distances of a
consumer-provider pair and the number of lines of Y-axis in grid topology. The topology for the
simulations are shown in Fig. 3. Fixing a consumer’s location, performances are evaluated
varying distances to a provider. The distances are 5, 10, 15, 20 hops. In addition to varying
distances between the consumer and the provider, the grid sizes are varied as like 5 and 15 lines.
1 line means there is only one path between the consumer and the provider. That is, the number
of hop indicates the number of relay nodes in x-axis over grid topology while the number of lines
indicates the number of relay nodes in y-axis in the topology. Therefore, we evaluates the
performances over 8 sizes of networks (4 types of hops and 2 types of lines).
Fig. 4 shows the average content download time as varying the distance between a consumer and
provider when the numbers of lines are 5 and 15. As mentioned before, the distance is
represented using the number of hops between the consumer-provider pair and the distance is
varied from 5 to 20 hops. As shown in the figure, the proposed protocol reduces the download
time from 16% to 52% comparing to E-CHANET protocol. From the figure, as the distance
increases, the reduction of download time is larger. The reason is because E-CHANET protocol
makes more packets flooded over the networks as the distance increase. Since higher traffics over
5 10 15 20
0
5
10
15
20
25
30
35
40
Number of Hops
AverageContentsDownloadTime(sec)
E-CHANET w/ 5-line
Proposed w/ 5-line
E-CHANET w/ 15-line
Proposed w/ 15-line
E-CHANET
15 lines
5 lines
Proposed
182 Computer Science & Information Technology (CS & IT)
the networks causes higher download time because of packet losses due to collisions and longer
backoff time in MAC layer. It is noticed that there is exceptionally long download time of E-
CHANET protocol in 5 lines in Fig. 4. This can be explained from Fig. 5 showing the average
number of retries. As Fig. 5 shows, E-CHANET protocol has the highest number of retries. Since
the forwarding path becomes narrower, the advantage of E-CHANET protocol’s flooding-based
Data packet forwarding decreases. Even though flooding-based packet forwarding method cause
lots of collisions because too many nodes are participating in transmissions, the packet can
eventually delivered to the consumer through many alternative paths because it is flooded.
However, in the narrower network like 5 lines, the number of alternative paths are limited,
so that the advantage of flooding decreases. Therefore, the number of retransmissions
increases which leads the download time’s increase.
Figure. 5. Average number of retries as a function of the distance between a consumer-provider pair
5. CONCLUSIONS
In this paper, a novel protocol for wireless CCNs is proposed. Even though the protocol uses
broadcasting and flooding-based Data packet forwarding, by restricting flooding area and giving
transmission priority to a nodes on the shortest path, the protocol resolves the long content
download time issue. The proposed protocol is evaluated throughout extensive simulations and it
is proved that the objective of the proposed protocol successfully achieved by reducing a content
download time up to 50% comparing to the conventional protocol.
ACKNOWLEDGEMENTS
This research was supported in parts by Basic Science Research Program through the National
Research Foundation of Korea (NRF) funded by the Ministry of Education
(2013R1A1A2005692) and in parts by the International Science and Business Belt Program
through the Ministry of Science, ICT and Future Planning (2015K000270).
Computer Science & Information Technology (CS & IT) 183
REFERENCES
[1] V. Jacobson, D.K. Smetters, J.D. Thornton, M.F. Plass, N.H. Briggs, and R.L. Braynard,
“Networking named content,” Proc. Int. Conf. on Emerging Networking Experiments and
Technologies, (CoNEXT’09), Rome, Italy, Dec. 2009. pp. 1-12.
[2] M. Amadeo, A. Molinaro, and G. Ruggeri, "E-CHANET: routing, forwarding and transport in
information-centric multihop wireless networks," Computer Communications, vol. 36, no. 7, pp. 792-
803, April 2013.
[3] M Amadeo, C Campolo, and A Molinaro, "Enhancing content-centric networking for vehicular
environments," Computer Networks, vol. 57, no. 16, pp. 3222-3234, November. 2013.
[4] O. Adem, S. Kang, Y.B. Ko, "Packet Loss Avoidance in Content Centric Mobile Adhoc Netowrks,"
15th International Conference on Advanced Communication Technology (ICACT’13), pp. 245-250,
PyeongChang, Korea, January 2013.
[5] H. Han, M. Wu, Q. Hu, and N. Wang, "Best Route, Error Broadcast: A Content-Centric Forwarding
Protocol for MANETs," IEEE 80th Vehicular Technology Conference (VTC Fall), pp. 14-17,
Vancouver, Canada, September 2014.
[6] Y.-T. Yu, B.R. Dilmaghani, S. Calo, M.Y. Sanadidi, and M. Gerla, “Interest propagation in named
data manets," in Proc. of IEEE International Conference on Computing, Networking, and
Communications (ICNC’2013), pp. 1118-1122, San Diego, CA, January 2013.
[7] D. Kim and Y.-B. Ko, “A novel message broadcasting strategy for reliable content retrieval in multi-
hop wireless content centric networks,” In Proceedings of the 9th ACM International Conference on
Ubiquitous Information Management and Communication, Bali, Indonesia, January 2015.
[8] R.A. Rehman and B.-S. Kim, “Energy aware forwarding in content centric based multihop wireless
ad hoc networks,” IEICE transactions on on Fundamentals of Electronics, Communications and
Computer Sciences,vol. E98-A, no. 12, pp. 2738-2742, December 2015.
[9] M. Amadeo, C. Campolo, and A. Molinaro, “Forwarding strategies in named data wireless ad hoc
networks: Design and evaluation,” Journal of Network and Computer Applications, vol. 50, pp. 148-
158, April 2015.
[10] D. Kim, J.-H. Kim, C. Moon, J. Choi, and I. Yeom, “Efficient content delivery in mobile ad-hoc
networks using ccn,” Ad Hoc Networks, vol. 36, pp. 81-99, January 2016.
[11] A. Afanasyev, I. Moiseenko, and L. Zhang, “ndnSIM: NDN simulator for NS-3,” Technical Report
NDN-0005, NDN, October 2012.

More Related Content

What's hot

Part 1: Efficient Multimedia Delivery in Content-Centric Mobile Networks
Part 1: Efficient Multimedia Delivery in Content-Centric Mobile NetworksPart 1: Efficient Multimedia Delivery in Content-Centric Mobile Networks
Part 1: Efficient Multimedia Delivery in Content-Centric Mobile NetworksDr. Mahfuzur Rahman Bosunia
 
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...pijans
 
CONCEPTUAL FRAMEWORK OF REDUNDANT LINK AGGREGATION
CONCEPTUAL FRAMEWORK OF REDUNDANT LINK AGGREGATIONCONCEPTUAL FRAMEWORK OF REDUNDANT LINK AGGREGATION
CONCEPTUAL FRAMEWORK OF REDUNDANT LINK AGGREGATIONcseij
 
Analysis of Link State Resource Reservation Protocol for Congestion Managemen...
Analysis of Link State Resource Reservation Protocol for Congestion Managemen...Analysis of Link State Resource Reservation Protocol for Congestion Managemen...
Analysis of Link State Resource Reservation Protocol for Congestion Managemen...ijgca
 
PERFORMANCE EVALUATION OF MOBILE IP ON MOBILE AD HOC NETWORKS USING NS2
PERFORMANCE EVALUATION OF MOBILE IP ON MOBILE AD HOC NETWORKS USING NS2PERFORMANCE EVALUATION OF MOBILE IP ON MOBILE AD HOC NETWORKS USING NS2
PERFORMANCE EVALUATION OF MOBILE IP ON MOBILE AD HOC NETWORKS USING NS2cscpconf
 
ENERGY CONSUMPTION REDUCTION IN WIRELESS SENSOR NETWORK BASED ON CLUSTERING
ENERGY CONSUMPTION REDUCTION IN WIRELESS SENSOR NETWORK BASED ON CLUSTERINGENERGY CONSUMPTION REDUCTION IN WIRELESS SENSOR NETWORK BASED ON CLUSTERING
ENERGY CONSUMPTION REDUCTION IN WIRELESS SENSOR NETWORK BASED ON CLUSTERINGIJCNCJournal
 
UAN (Underwater Acoustic Network)
UAN (Underwater Acoustic Network)UAN (Underwater Acoustic Network)
UAN (Underwater Acoustic Network)Prof Ansari
 
Practical active network services within content-aware gateways
Practical active network services within content-aware gatewaysPractical active network services within content-aware gateways
Practical active network services within content-aware gatewaysTal Lavian Ph.D.
 
Application Aware Topology Generation for Surface Wave Networks-on-Chip
Application Aware Topology Generation for Surface Wave Networks-on-ChipApplication Aware Topology Generation for Surface Wave Networks-on-Chip
Application Aware Topology Generation for Surface Wave Networks-on-Chipzhao fu
 
Spatial ReusabilityAware Routing in Multi-Hop Wireless Networks Using Single ...
Spatial ReusabilityAware Routing in Multi-Hop Wireless Networks Using Single ...Spatial ReusabilityAware Routing in Multi-Hop Wireless Networks Using Single ...
Spatial ReusabilityAware Routing in Multi-Hop Wireless Networks Using Single ...dbpublications
 
Experimental evaluation of scalability and reliability of a feedback based up...
Experimental evaluation of scalability and reliability of a feedback based up...Experimental evaluation of scalability and reliability of a feedback based up...
Experimental evaluation of scalability and reliability of a feedback based up...ijma
 
3 S W 2009 I E E E Abstracts Java, N C C T Chennai
3    S W   2009  I E E E  Abstracts    Java,  N C C T  Chennai3    S W   2009  I E E E  Abstracts    Java,  N C C T  Chennai
3 S W 2009 I E E E Abstracts Java, N C C T Chennaincct
 

What's hot (16)

A new algorithm to improve the sharing of bandwidth
A new algorithm to improve the sharing of bandwidthA new algorithm to improve the sharing of bandwidth
A new algorithm to improve the sharing of bandwidth
 
03
0303
03
 
Part 1: Efficient Multimedia Delivery in Content-Centric Mobile Networks
Part 1: Efficient Multimedia Delivery in Content-Centric Mobile NetworksPart 1: Efficient Multimedia Delivery in Content-Centric Mobile Networks
Part 1: Efficient Multimedia Delivery in Content-Centric Mobile Networks
 
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
A CELLULAR BONDING AND ADAPTIVE LOAD BALANCING BASED MULTI-SIM GATEWAY FOR MO...
 
CONCEPTUAL FRAMEWORK OF REDUNDANT LINK AGGREGATION
CONCEPTUAL FRAMEWORK OF REDUNDANT LINK AGGREGATIONCONCEPTUAL FRAMEWORK OF REDUNDANT LINK AGGREGATION
CONCEPTUAL FRAMEWORK OF REDUNDANT LINK AGGREGATION
 
Analysis of Link State Resource Reservation Protocol for Congestion Managemen...
Analysis of Link State Resource Reservation Protocol for Congestion Managemen...Analysis of Link State Resource Reservation Protocol for Congestion Managemen...
Analysis of Link State Resource Reservation Protocol for Congestion Managemen...
 
Npma Final
Npma FinalNpma Final
Npma Final
 
Chapter 3 v6.0
Chapter 3 v6.0Chapter 3 v6.0
Chapter 3 v6.0
 
PERFORMANCE EVALUATION OF MOBILE IP ON MOBILE AD HOC NETWORKS USING NS2
PERFORMANCE EVALUATION OF MOBILE IP ON MOBILE AD HOC NETWORKS USING NS2PERFORMANCE EVALUATION OF MOBILE IP ON MOBILE AD HOC NETWORKS USING NS2
PERFORMANCE EVALUATION OF MOBILE IP ON MOBILE AD HOC NETWORKS USING NS2
 
ENERGY CONSUMPTION REDUCTION IN WIRELESS SENSOR NETWORK BASED ON CLUSTERING
ENERGY CONSUMPTION REDUCTION IN WIRELESS SENSOR NETWORK BASED ON CLUSTERINGENERGY CONSUMPTION REDUCTION IN WIRELESS SENSOR NETWORK BASED ON CLUSTERING
ENERGY CONSUMPTION REDUCTION IN WIRELESS SENSOR NETWORK BASED ON CLUSTERING
 
UAN (Underwater Acoustic Network)
UAN (Underwater Acoustic Network)UAN (Underwater Acoustic Network)
UAN (Underwater Acoustic Network)
 
Practical active network services within content-aware gateways
Practical active network services within content-aware gatewaysPractical active network services within content-aware gateways
Practical active network services within content-aware gateways
 
Application Aware Topology Generation for Surface Wave Networks-on-Chip
Application Aware Topology Generation for Surface Wave Networks-on-ChipApplication Aware Topology Generation for Surface Wave Networks-on-Chip
Application Aware Topology Generation for Surface Wave Networks-on-Chip
 
Spatial ReusabilityAware Routing in Multi-Hop Wireless Networks Using Single ...
Spatial ReusabilityAware Routing in Multi-Hop Wireless Networks Using Single ...Spatial ReusabilityAware Routing in Multi-Hop Wireless Networks Using Single ...
Spatial ReusabilityAware Routing in Multi-Hop Wireless Networks Using Single ...
 
Experimental evaluation of scalability and reliability of a feedback based up...
Experimental evaluation of scalability and reliability of a feedback based up...Experimental evaluation of scalability and reliability of a feedback based up...
Experimental evaluation of scalability and reliability of a feedback based up...
 
3 S W 2009 I E E E Abstracts Java, N C C T Chennai
3    S W   2009  I E E E  Abstracts    Java,  N C C T  Chennai3    S W   2009  I E E E  Abstracts    Java,  N C C T  Chennai
3 S W 2009 I E E E Abstracts Java, N C C T Chennai
 

Viewers also liked

USABILITY TESTING IN MOBILE APPLICATIONS INVOLVING PEOPLE WITH DOWN SYNDROME:...
USABILITY TESTING IN MOBILE APPLICATIONS INVOLVING PEOPLE WITH DOWN SYNDROME:...USABILITY TESTING IN MOBILE APPLICATIONS INVOLVING PEOPLE WITH DOWN SYNDROME:...
USABILITY TESTING IN MOBILE APPLICATIONS INVOLVING PEOPLE WITH DOWN SYNDROME:...csandit
 
IMPROVING SCHEDULING OF DATA TRANSMISSION IN TDMA SYSTEMS
IMPROVING SCHEDULING OF DATA TRANSMISSION IN TDMA SYSTEMSIMPROVING SCHEDULING OF DATA TRANSMISSION IN TDMA SYSTEMS
IMPROVING SCHEDULING OF DATA TRANSMISSION IN TDMA SYSTEMScsandit
 
Nonlinear Extension of Asymmetric Garch Model within Neural Network Framework
Nonlinear Extension of Asymmetric Garch Model within Neural Network Framework Nonlinear Extension of Asymmetric Garch Model within Neural Network Framework
Nonlinear Extension of Asymmetric Garch Model within Neural Network Framework csandit
 
AUTOMATED SHORT ANSWER GRADER USING FRIENDSHIP GRAPHS
AUTOMATED SHORT ANSWER GRADER USING FRIENDSHIP GRAPHSAUTOMATED SHORT ANSWER GRADER USING FRIENDSHIP GRAPHS
AUTOMATED SHORT ANSWER GRADER USING FRIENDSHIP GRAPHScsandit
 
Knowledge management in higher
Knowledge management in higherKnowledge management in higher
Knowledge management in highercsandit
 
Svhsievs for navigation in virtual
Svhsievs for navigation in virtualSvhsievs for navigation in virtual
Svhsievs for navigation in virtualcsandit
 
Improved algorithm for road region segmentation based on sequential monte car...
Improved algorithm for road region segmentation based on sequential monte car...Improved algorithm for road region segmentation based on sequential monte car...
Improved algorithm for road region segmentation based on sequential monte car...csandit
 
Investigation of Chaotic-Type Features in Hyperspectral Satellite Data
Investigation of Chaotic-Type Features in Hyperspectral Satellite DataInvestigation of Chaotic-Type Features in Hyperspectral Satellite Data
Investigation of Chaotic-Type Features in Hyperspectral Satellite Datacsandit
 
The Effect of Social Welfare System Based on the Complex Network
The Effect of Social Welfare System Based on the Complex NetworkThe Effect of Social Welfare System Based on the Complex Network
The Effect of Social Welfare System Based on the Complex Networkcsandit
 
Comparative Performance Analysis of Machine Learning Techniques for Software ...
Comparative Performance Analysis of Machine Learning Techniques for Software ...Comparative Performance Analysis of Machine Learning Techniques for Software ...
Comparative Performance Analysis of Machine Learning Techniques for Software ...csandit
 
The Chaotic Structure of Bacterial Virulence Protein Sequences
The Chaotic Structure of Bacterial Virulence Protein SequencesThe Chaotic Structure of Bacterial Virulence Protein Sequences
The Chaotic Structure of Bacterial Virulence Protein Sequencescsandit
 
Implemenation of Vedic Multiplier Using Reversible Gates
Implemenation of Vedic Multiplier Using Reversible Gates Implemenation of Vedic Multiplier Using Reversible Gates
Implemenation of Vedic Multiplier Using Reversible Gates csandit
 
Fault-Tolerance Aware Multi Objective Scheduling Algorithm for Task Schedulin...
Fault-Tolerance Aware Multi Objective Scheduling Algorithm for Task Schedulin...Fault-Tolerance Aware Multi Objective Scheduling Algorithm for Task Schedulin...
Fault-Tolerance Aware Multi Objective Scheduling Algorithm for Task Schedulin...csandit
 
QOS-B ASED P ERFORMANCE E VALUATION OF C HANNEL -A WARE /QOS-A WARE S CHEDULI...
QOS-B ASED P ERFORMANCE E VALUATION OF C HANNEL -A WARE /QOS-A WARE S CHEDULI...QOS-B ASED P ERFORMANCE E VALUATION OF C HANNEL -A WARE /QOS-A WARE S CHEDULI...
QOS-B ASED P ERFORMANCE E VALUATION OF C HANNEL -A WARE /QOS-A WARE S CHEDULI...csandit
 
O N T HE D ISTRIBUTION OF T HE M AXIMAL C LIQUE S IZE F OR T HE V ERTICES IN ...
O N T HE D ISTRIBUTION OF T HE M AXIMAL C LIQUE S IZE F OR T HE V ERTICES IN ...O N T HE D ISTRIBUTION OF T HE M AXIMAL C LIQUE S IZE F OR T HE V ERTICES IN ...
O N T HE D ISTRIBUTION OF T HE M AXIMAL C LIQUE S IZE F OR T HE V ERTICES IN ...csandit
 
IMAGE REGISTRATION USING ADVANCED TOPOLOGY PRESERVING RELAXATION LABELING
IMAGE REGISTRATION USING ADVANCED TOPOLOGY PRESERVING RELAXATION LABELING IMAGE REGISTRATION USING ADVANCED TOPOLOGY PRESERVING RELAXATION LABELING
IMAGE REGISTRATION USING ADVANCED TOPOLOGY PRESERVING RELAXATION LABELING csandit
 
Associating events with people on social networks using a priori
Associating events with people on social networks using a prioriAssociating events with people on social networks using a priori
Associating events with people on social networks using a prioricsandit
 
X-TREPAN : A Multi Class Regression and Adapted Extraction of Comprehensible ...
X-TREPAN : A Multi Class Regression and Adapted Extraction of Comprehensible ...X-TREPAN : A Multi Class Regression and Adapted Extraction of Comprehensible ...
X-TREPAN : A Multi Class Regression and Adapted Extraction of Comprehensible ...csandit
 

Viewers also liked (18)

USABILITY TESTING IN MOBILE APPLICATIONS INVOLVING PEOPLE WITH DOWN SYNDROME:...
USABILITY TESTING IN MOBILE APPLICATIONS INVOLVING PEOPLE WITH DOWN SYNDROME:...USABILITY TESTING IN MOBILE APPLICATIONS INVOLVING PEOPLE WITH DOWN SYNDROME:...
USABILITY TESTING IN MOBILE APPLICATIONS INVOLVING PEOPLE WITH DOWN SYNDROME:...
 
IMPROVING SCHEDULING OF DATA TRANSMISSION IN TDMA SYSTEMS
IMPROVING SCHEDULING OF DATA TRANSMISSION IN TDMA SYSTEMSIMPROVING SCHEDULING OF DATA TRANSMISSION IN TDMA SYSTEMS
IMPROVING SCHEDULING OF DATA TRANSMISSION IN TDMA SYSTEMS
 
Nonlinear Extension of Asymmetric Garch Model within Neural Network Framework
Nonlinear Extension of Asymmetric Garch Model within Neural Network Framework Nonlinear Extension of Asymmetric Garch Model within Neural Network Framework
Nonlinear Extension of Asymmetric Garch Model within Neural Network Framework
 
AUTOMATED SHORT ANSWER GRADER USING FRIENDSHIP GRAPHS
AUTOMATED SHORT ANSWER GRADER USING FRIENDSHIP GRAPHSAUTOMATED SHORT ANSWER GRADER USING FRIENDSHIP GRAPHS
AUTOMATED SHORT ANSWER GRADER USING FRIENDSHIP GRAPHS
 
Knowledge management in higher
Knowledge management in higherKnowledge management in higher
Knowledge management in higher
 
Svhsievs for navigation in virtual
Svhsievs for navigation in virtualSvhsievs for navigation in virtual
Svhsievs for navigation in virtual
 
Improved algorithm for road region segmentation based on sequential monte car...
Improved algorithm for road region segmentation based on sequential monte car...Improved algorithm for road region segmentation based on sequential monte car...
Improved algorithm for road region segmentation based on sequential monte car...
 
Investigation of Chaotic-Type Features in Hyperspectral Satellite Data
Investigation of Chaotic-Type Features in Hyperspectral Satellite DataInvestigation of Chaotic-Type Features in Hyperspectral Satellite Data
Investigation of Chaotic-Type Features in Hyperspectral Satellite Data
 
The Effect of Social Welfare System Based on the Complex Network
The Effect of Social Welfare System Based on the Complex NetworkThe Effect of Social Welfare System Based on the Complex Network
The Effect of Social Welfare System Based on the Complex Network
 
Comparative Performance Analysis of Machine Learning Techniques for Software ...
Comparative Performance Analysis of Machine Learning Techniques for Software ...Comparative Performance Analysis of Machine Learning Techniques for Software ...
Comparative Performance Analysis of Machine Learning Techniques for Software ...
 
The Chaotic Structure of Bacterial Virulence Protein Sequences
The Chaotic Structure of Bacterial Virulence Protein SequencesThe Chaotic Structure of Bacterial Virulence Protein Sequences
The Chaotic Structure of Bacterial Virulence Protein Sequences
 
Implemenation of Vedic Multiplier Using Reversible Gates
Implemenation of Vedic Multiplier Using Reversible Gates Implemenation of Vedic Multiplier Using Reversible Gates
Implemenation of Vedic Multiplier Using Reversible Gates
 
Fault-Tolerance Aware Multi Objective Scheduling Algorithm for Task Schedulin...
Fault-Tolerance Aware Multi Objective Scheduling Algorithm for Task Schedulin...Fault-Tolerance Aware Multi Objective Scheduling Algorithm for Task Schedulin...
Fault-Tolerance Aware Multi Objective Scheduling Algorithm for Task Schedulin...
 
QOS-B ASED P ERFORMANCE E VALUATION OF C HANNEL -A WARE /QOS-A WARE S CHEDULI...
QOS-B ASED P ERFORMANCE E VALUATION OF C HANNEL -A WARE /QOS-A WARE S CHEDULI...QOS-B ASED P ERFORMANCE E VALUATION OF C HANNEL -A WARE /QOS-A WARE S CHEDULI...
QOS-B ASED P ERFORMANCE E VALUATION OF C HANNEL -A WARE /QOS-A WARE S CHEDULI...
 
O N T HE D ISTRIBUTION OF T HE M AXIMAL C LIQUE S IZE F OR T HE V ERTICES IN ...
O N T HE D ISTRIBUTION OF T HE M AXIMAL C LIQUE S IZE F OR T HE V ERTICES IN ...O N T HE D ISTRIBUTION OF T HE M AXIMAL C LIQUE S IZE F OR T HE V ERTICES IN ...
O N T HE D ISTRIBUTION OF T HE M AXIMAL C LIQUE S IZE F OR T HE V ERTICES IN ...
 
IMAGE REGISTRATION USING ADVANCED TOPOLOGY PRESERVING RELAXATION LABELING
IMAGE REGISTRATION USING ADVANCED TOPOLOGY PRESERVING RELAXATION LABELING IMAGE REGISTRATION USING ADVANCED TOPOLOGY PRESERVING RELAXATION LABELING
IMAGE REGISTRATION USING ADVANCED TOPOLOGY PRESERVING RELAXATION LABELING
 
Associating events with people on social networks using a priori
Associating events with people on social networks using a prioriAssociating events with people on social networks using a priori
Associating events with people on social networks using a priori
 
X-TREPAN : A Multi Class Regression and Adapted Extraction of Comprehensible ...
X-TREPAN : A Multi Class Regression and Adapted Extraction of Comprehensible ...X-TREPAN : A Multi Class Regression and Adapted Extraction of Comprehensible ...
X-TREPAN : A Multi Class Regression and Adapted Extraction of Comprehensible ...
 

Similar to Enhanced Protocol for Wireless Content-Centric Network

An Insight Into The Qos Techniques
An Insight Into The Qos TechniquesAn Insight Into The Qos Techniques
An Insight Into The Qos TechniquesKatie Gulley
 
Project synopsis
Project synopsisProject synopsis
Project synopsisgirija12345
 
Evaluating content-centric communication over power line communication infras...
Evaluating content-centric communication over power line communication infras...Evaluating content-centric communication over power line communication infras...
Evaluating content-centric communication over power line communication infras...Khaled Ben Driss
 
ANALYSIS OF LINK STATE RESOURCE RESERVATION PROTOCOL FOR CONGESTION MANAGEMEN...
ANALYSIS OF LINK STATE RESOURCE RESERVATION PROTOCOL FOR CONGESTION MANAGEMEN...ANALYSIS OF LINK STATE RESOURCE RESERVATION PROTOCOL FOR CONGESTION MANAGEMEN...
ANALYSIS OF LINK STATE RESOURCE RESERVATION PROTOCOL FOR CONGESTION MANAGEMEN...ijgca
 
Secured Seamless Wi-Fi Enhancement in Dynamic Vehicles
Secured Seamless Wi-Fi Enhancement in Dynamic VehiclesSecured Seamless Wi-Fi Enhancement in Dynamic Vehicles
Secured Seamless Wi-Fi Enhancement in Dynamic Vehiclesijcnes
 
Study and analysis of mobility, security, and caching issues in CCN
Study and analysis of mobility, security,  and caching issues in CCN Study and analysis of mobility, security,  and caching issues in CCN
Study and analysis of mobility, security, and caching issues in CCN IJECEIAES
 
FAST PACKETS DELIVERY TECHNIQUES FOR URGENT PACKETS IN EMERGENCY APPLICATIONS...
FAST PACKETS DELIVERY TECHNIQUES FOR URGENT PACKETS IN EMERGENCY APPLICATIONS...FAST PACKETS DELIVERY TECHNIQUES FOR URGENT PACKETS IN EMERGENCY APPLICATIONS...
FAST PACKETS DELIVERY TECHNIQUES FOR URGENT PACKETS IN EMERGENCY APPLICATIONS...IJCNCJournal
 
A Study on Quality Of Service (QOS) in Ubiquitous Wireless Sensor Networks
A Study on Quality Of Service (QOS) in Ubiquitous Wireless Sensor NetworksA Study on Quality Of Service (QOS) in Ubiquitous Wireless Sensor Networks
A Study on Quality Of Service (QOS) in Ubiquitous Wireless Sensor NetworksIRJET Journal
 
Part 2: Efficient Multimedia Delivery in Content-Centric Mobile Networks
Part 2: Efficient Multimedia Delivery in Content-Centric Mobile NetworksPart 2: Efficient Multimedia Delivery in Content-Centric Mobile Networks
Part 2: Efficient Multimedia Delivery in Content-Centric Mobile NetworksDr. Mahfuzur Rahman Bosunia
 
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...Developing QoS by Priority Routing for Real Time Data in Internet of Things (...
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...IJCNCJournal
 
Multi Bandwidth Data path design for 5G Wireless Systems
Multi Bandwidth Data path design for 5G Wireless SystemsMulti Bandwidth Data path design for 5G Wireless Systems
Multi Bandwidth Data path design for 5G Wireless SystemsChaitanya Krishna
 
Hop Count Based Interest Selection and Content Forwarding Scheme for Vehicula...
Hop Count Based Interest Selection and Content Forwarding Scheme for Vehicula...Hop Count Based Interest Selection and Content Forwarding Scheme for Vehicula...
Hop Count Based Interest Selection and Content Forwarding Scheme for Vehicula...IJCNCJournal
 
Hop Count Based Interest Selection and Content Forwarding Scheme for Vehicula...
Hop Count Based Interest Selection and Content Forwarding Scheme for Vehicula...Hop Count Based Interest Selection and Content Forwarding Scheme for Vehicula...
Hop Count Based Interest Selection and Content Forwarding Scheme for Vehicula...IJCNCJournal
 
A New Efficient Cache Replacement Strategy for Named Data Networking
A New Efficient Cache Replacement Strategy for Named Data NetworkingA New Efficient Cache Replacement Strategy for Named Data Networking
A New Efficient Cache Replacement Strategy for Named Data NetworkingIJCNCJournal
 
A NEW EFFICIENT CACHE REPLACEMENT STRATEGY FOR NAMED DATA NETWORKING
A NEW EFFICIENT CACHE REPLACEMENT STRATEGY FOR NAMED DATA NETWORKINGA NEW EFFICIENT CACHE REPLACEMENT STRATEGY FOR NAMED DATA NETWORKING
A NEW EFFICIENT CACHE REPLACEMENT STRATEGY FOR NAMED DATA NETWORKINGIJCNCJournal
 
Experimental assessment of abno driven multicast connectivity in flexgrid net...
Experimental assessment of abno driven multicast connectivity in flexgrid net...Experimental assessment of abno driven multicast connectivity in flexgrid net...
Experimental assessment of abno driven multicast connectivity in flexgrid net...ieeepondy
 
AN ADVANCED QOS ANALYSIS AND EVALUATION METHOD FOR MOBILE INTERNET ACCESS
AN ADVANCED QOS ANALYSIS AND EVALUATION METHOD FOR MOBILE INTERNET ACCESS AN ADVANCED QOS ANALYSIS AND EVALUATION METHOD FOR MOBILE INTERNET ACCESS
AN ADVANCED QOS ANALYSIS AND EVALUATION METHOD FOR MOBILE INTERNET ACCESS ijwmn
 
AN ADVANCED QOS ANALYSIS AND EVALUATION METHOD FOR MOBILE INTERNET ACCESS
AN ADVANCED QOS ANALYSIS AND EVALUATION METHOD FOR MOBILE INTERNET ACCESS AN ADVANCED QOS ANALYSIS AND EVALUATION METHOD FOR MOBILE INTERNET ACCESS
AN ADVANCED QOS ANALYSIS AND EVALUATION METHOD FOR MOBILE INTERNET ACCESS ijwmn
 
An approximation delay between consecutive requests for congestion control in...
An approximation delay between consecutive requests for congestion control in...An approximation delay between consecutive requests for congestion control in...
An approximation delay between consecutive requests for congestion control in...IJECEIAES
 

Similar to Enhanced Protocol for Wireless Content-Centric Network (20)

An Insight Into The Qos Techniques
An Insight Into The Qos TechniquesAn Insight Into The Qos Techniques
An Insight Into The Qos Techniques
 
Project synopsis
Project synopsisProject synopsis
Project synopsis
 
Evaluating content-centric communication over power line communication infras...
Evaluating content-centric communication over power line communication infras...Evaluating content-centric communication over power line communication infras...
Evaluating content-centric communication over power line communication infras...
 
ANALYSIS OF LINK STATE RESOURCE RESERVATION PROTOCOL FOR CONGESTION MANAGEMEN...
ANALYSIS OF LINK STATE RESOURCE RESERVATION PROTOCOL FOR CONGESTION MANAGEMEN...ANALYSIS OF LINK STATE RESOURCE RESERVATION PROTOCOL FOR CONGESTION MANAGEMEN...
ANALYSIS OF LINK STATE RESOURCE RESERVATION PROTOCOL FOR CONGESTION MANAGEMEN...
 
Secured Seamless Wi-Fi Enhancement in Dynamic Vehicles
Secured Seamless Wi-Fi Enhancement in Dynamic VehiclesSecured Seamless Wi-Fi Enhancement in Dynamic Vehicles
Secured Seamless Wi-Fi Enhancement in Dynamic Vehicles
 
IJCA
IJCAIJCA
IJCA
 
Study and analysis of mobility, security, and caching issues in CCN
Study and analysis of mobility, security,  and caching issues in CCN Study and analysis of mobility, security,  and caching issues in CCN
Study and analysis of mobility, security, and caching issues in CCN
 
FAST PACKETS DELIVERY TECHNIQUES FOR URGENT PACKETS IN EMERGENCY APPLICATIONS...
FAST PACKETS DELIVERY TECHNIQUES FOR URGENT PACKETS IN EMERGENCY APPLICATIONS...FAST PACKETS DELIVERY TECHNIQUES FOR URGENT PACKETS IN EMERGENCY APPLICATIONS...
FAST PACKETS DELIVERY TECHNIQUES FOR URGENT PACKETS IN EMERGENCY APPLICATIONS...
 
A Study on Quality Of Service (QOS) in Ubiquitous Wireless Sensor Networks
A Study on Quality Of Service (QOS) in Ubiquitous Wireless Sensor NetworksA Study on Quality Of Service (QOS) in Ubiquitous Wireless Sensor Networks
A Study on Quality Of Service (QOS) in Ubiquitous Wireless Sensor Networks
 
Part 2: Efficient Multimedia Delivery in Content-Centric Mobile Networks
Part 2: Efficient Multimedia Delivery in Content-Centric Mobile NetworksPart 2: Efficient Multimedia Delivery in Content-Centric Mobile Networks
Part 2: Efficient Multimedia Delivery in Content-Centric Mobile Networks
 
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...Developing QoS by Priority Routing for Real Time Data in Internet of Things (...
Developing QoS by Priority Routing for Real Time Data in Internet of Things (...
 
Multi Bandwidth Data path design for 5G Wireless Systems
Multi Bandwidth Data path design for 5G Wireless SystemsMulti Bandwidth Data path design for 5G Wireless Systems
Multi Bandwidth Data path design for 5G Wireless Systems
 
Hop Count Based Interest Selection and Content Forwarding Scheme for Vehicula...
Hop Count Based Interest Selection and Content Forwarding Scheme for Vehicula...Hop Count Based Interest Selection and Content Forwarding Scheme for Vehicula...
Hop Count Based Interest Selection and Content Forwarding Scheme for Vehicula...
 
Hop Count Based Interest Selection and Content Forwarding Scheme for Vehicula...
Hop Count Based Interest Selection and Content Forwarding Scheme for Vehicula...Hop Count Based Interest Selection and Content Forwarding Scheme for Vehicula...
Hop Count Based Interest Selection and Content Forwarding Scheme for Vehicula...
 
A New Efficient Cache Replacement Strategy for Named Data Networking
A New Efficient Cache Replacement Strategy for Named Data NetworkingA New Efficient Cache Replacement Strategy for Named Data Networking
A New Efficient Cache Replacement Strategy for Named Data Networking
 
A NEW EFFICIENT CACHE REPLACEMENT STRATEGY FOR NAMED DATA NETWORKING
A NEW EFFICIENT CACHE REPLACEMENT STRATEGY FOR NAMED DATA NETWORKINGA NEW EFFICIENT CACHE REPLACEMENT STRATEGY FOR NAMED DATA NETWORKING
A NEW EFFICIENT CACHE REPLACEMENT STRATEGY FOR NAMED DATA NETWORKING
 
Experimental assessment of abno driven multicast connectivity in flexgrid net...
Experimental assessment of abno driven multicast connectivity in flexgrid net...Experimental assessment of abno driven multicast connectivity in flexgrid net...
Experimental assessment of abno driven multicast connectivity in flexgrid net...
 
AN ADVANCED QOS ANALYSIS AND EVALUATION METHOD FOR MOBILE INTERNET ACCESS
AN ADVANCED QOS ANALYSIS AND EVALUATION METHOD FOR MOBILE INTERNET ACCESS AN ADVANCED QOS ANALYSIS AND EVALUATION METHOD FOR MOBILE INTERNET ACCESS
AN ADVANCED QOS ANALYSIS AND EVALUATION METHOD FOR MOBILE INTERNET ACCESS
 
AN ADVANCED QOS ANALYSIS AND EVALUATION METHOD FOR MOBILE INTERNET ACCESS
AN ADVANCED QOS ANALYSIS AND EVALUATION METHOD FOR MOBILE INTERNET ACCESS AN ADVANCED QOS ANALYSIS AND EVALUATION METHOD FOR MOBILE INTERNET ACCESS
AN ADVANCED QOS ANALYSIS AND EVALUATION METHOD FOR MOBILE INTERNET ACCESS
 
An approximation delay between consecutive requests for congestion control in...
An approximation delay between consecutive requests for congestion control in...An approximation delay between consecutive requests for congestion control in...
An approximation delay between consecutive requests for congestion control in...
 

Recently uploaded

What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAbhinavSharma374939
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 

Recently uploaded (20)

What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 

Enhanced Protocol for Wireless Content-Centric Network

  • 1. Jan Zizka et al. (Eds) : CCSEIT, AIAP, DMDB, MoWiN, CoSIT, CRIS, SIGL, ICBB, CNSA-2016 pp. 175–183, 2016. © CS & IT-CSCP 2016 DOI : 10.5121/csit.2016.60614 ENHANCED PROTOCOL FOR WIRELESS CONTENT-CENTRIC NETWORK Chan-Min Park1 , Rana Asif Rehman2 , Tran Dinh Hieu2 , Byung-Seo Kim3 1 Graduate School of Smart City Science Management, Hongik University, Sejong, Republic of Korea walkinpcm@gmail.com 2 Dept. of Electronics and Computer Engineering, Hongik University, Sejong, Republic of Korea asifrehman7@gmail.com, trandinhhieu1989@gmail.com 3 Dept. of Computer and Information Communication Engineering, Hongik University, Sejong, Republic of Korea jsnbs@hongik.ac.kr ABSTRACT Recently, Content-Centric Networking (CCN) was introduced and is expected as a new concept of future internet architecture. Even though CCN is initially studied for wired networks, recently, it is also studied for wireless environment. In this paper, we discuss improvement method for efficient content flooding over wireless CCNs. The proposed scheme of this paper use MAC Address of nodes when Interest and Data Packet are forwarded in order to limit the area of flooding of packets. The proposed protocol not only reduces the spread of Data packets, but also offers priority of forwarding to nodes of shortest path. As a consequence, it reduce content download time which is proved by extensive simulations. KEYWORDS Network Protocols, CCN, Future Internet, Protocol, Wireless. 1. INTRODUCTION As mobile communication devices such as smartphones are widely used and rapidly spread out, so that peoples are easily connected through Internet, which is so-called Internet-of-People (IoP). Furthermore, such IoP not only increases tremendous of individuals data traffics, but also requests lots of huge contents such as video and music from content servers. Even though current Internet architecture provides efficiently end-to-end or host-to-host communications, it has been troubled to deal with user’s mobility environment and services of aforementioned massive contents provided to unspecified number of users. Particularly, due to popularity of video streaming services such as TED and YouTube, more video-like content traffics are flooded over the networks. In such video streaming services, many users request even same content in a different time to same content server which might be located far from their locations. For example, let’s assume that there is content server in U.S. and there are 10 people in Korea to
  • 2. 176 Computer Science & Information Technology (CS & IT) request the content in a different time and different area. In this case, the content server will send same content 10 times from U.S. to Korea. This is very inefficient way to provide content. In order efficiently to request and provide the content itself, Content Centric Network (CCN) concept has been proposed in year 2009 by Van Jacobson [1]. In CCN, when the first content is delivered, we allow some server or router in Korea to store the content. Therefore, the second user’s request on the same content can be provided from the nearby server or router, not far from server in U.S. Furthermore, CCN proposes to use a content name to request/distribute content instead of using IP address. That is, while current Internet focuses on “where to get” using IP address, CCN focuses on “what to get” using content name itself. Even though initial studies for CCN have been conducted on the wired networks, recent studies moves to CCN-based wireless networks and is actively being conducted [2]-[10] because as mentioned earlier, people enjoys contents through smart handheld devices while they are moving. However, the research on wireless CCN is still early-state and there are many issues to be resolved. One of issue is long delay to download contents because of broadcasting and flooding- based transmissions adopted by wireless CCN. In this paper, we focus on how to reduce flooded traffics in wireless CCN in order to reduce download time of contents. To resolve the issue, we propose a novel protocol to reduce the number of content request messages, named Interest packet, flooded over the networks. As a result, the proposed protocol reduces collisions and wasted time in wireless CCN. In Section 2, the fundamentals of CCN and some prior arts related with wireless CCNs are introduced. In Section 3, after motivation of this research is introduced, the proposed protocol is described. In Section 4, the proposed protocol is evaluated in terms of the content download time and conclusions are made in Section 5. 2. PRIOR ART CCN is composed of three devices and three packets [1]. Three devices are consumer, provider, and intermediate nodes, and three packets are Interest, Data, and Announcement packets. Each device consists of three components: Content Store (CS), Pending Interest Table (PIT), and Forwarding Information Base (FIB). A consumer requests a content by sending an Interest packet and the Interest packet is flooded over a network by all intermediate nodes. Once receiving the Interest packet, a node to check its CS if it has the content. If it has, it sends Data packets in the manner of broadcasting and it becomes a provider. If it doesn’t, it records the information of Interest packet in its PIT and broadcasts the Interest packet to Networks. Therefore, any node that has request content can be a provider which is a content server in terms of conventional IP-based networks. When receiving a Data packet, then it checks PIT to ensure any node requested the content before. If yes, it broadcasts the Data packet. Otherwise, it discards the packet. In CCN, a provider can broadcast announcement packet to let nodes in network know specific content that the node has in CS. After the concept of CCN was proposed, studies on wireless CCN have been actively performed [2]-[10]. Enhanced-Content-centric multiHop wireless NETwork (E-CHANET) is designed for wireless networks adopting CCN concept [2]. In E-CHANET, Announcement packet and FIB component are removed from the system. Instead, to cope with erroneous wireless channel, it uses Interest-Data-based two-way handshake performed between consumer and provider. Therefore, every Data packet transmission is requested by one Interest packet. If there is a lost
  • 3. Computer Science & Information Technology (CS & IT) 177 Data packet, same Interest packet is retransmitted. Calculating wait-time for receiving the requested Data packet and handoff method between different providers are also designed. The CCN communication method is also applied to vehicular networks [4]. CarSpeak enables a car to query and access sensory information captured by other cars in a manner similar to a way to request a content in content-centric approach. Authors in [4] try to solve packet loss problem caused by node mobility in CCN-based MANETs. In [4], both of broadcast and unicast are used for the transmissions of Interest packets, and additional function is added which is to validate if the next hop node is available when a node receives Interest or Data packet. Flooding issue in CCN has been studied in [5][6]. In [5], the shortest hop count is found by flooding Interest packets and then Data packet is flooded back to consumer within the hop count. In [6], the authors proposed a new scheme called Neighborhood-Aware Interest Forwarding (NAIF) for NDN-based mobile ad hoc networks. This scheme basically reduces the flooding overhead in the network. In which, the intermediate node locally decide to propagate or drop the received Interest packet based on the forwarding rate. Authors in [7] propose a scheme for multihop based wireless CCN. Two additional packets, called EFS-ACK and EFS are also utilized in addition to the Interest and Data packets. In [8], the authors present an energy aware forwarding scheme for multihop wireless ad hoc networks. In which, the packets are forwarded based on node's residual energy. Authors in [9] propose forwarding strategies (i.e. BF, PAF) for wireless CCN ad hoc networks. These schemes are deeply analyze and well evaluated. Furthermore, the authors also highlight the advantages and shortcoming of both approaches. Kim et al., in [10], present a novel scheme, named AIRDrop in which communication is based on unicast manner. Proposed AIRDrop scheme also takes into account the extra tables and buffers during its communication operations. Figure. 1. Revised packet formats for the proposed protocol: (a) Interest packet and (b) Data packet 3. PROPOSED PROTOCOL 3.1. Motivation Although previously proposed protocols for CCN-based wireless networks provide advantages for delivering contents, their performance is still struggling in terms of content download time. One of the reasons is inefficient Data packet forwarding mechanism. In wireless environments, using broadcasting manner, the direction of packet flows cannot be controlled, so that too much flooding causes delays to download contents. Since many wireless routing protocols uses unicasting and IP addresses, so that packet’s flow can be controlled using IP addresses. However, because wireless CCNs do not use IP address and use broadcasting address for MAC protocol, it MACAddrList HopCnt MACAddrList MaxHopCnt (a) (b)
  • 4. 178 Computer Science & Information Technology (CS & IT) is hard to restrict flooding area and control the content flows. On the other hand, totally removing flooding in wireless CCNs also removes advantage of CCNs’ nature which is to spread contents over the networks for possible upcoming content request. Therefore, the objective of this paper is to propose a protocol for wireless CCNs which not only limits flooding of Data packets in a certain range over the networks, but also speeds up content download time using a shortest path from a provider to a consumer. In the proposed protocol, the way to forward Interest packet is same as that of E-CHANET. However, whenever nodes forwards the packet, they add their MAC addresses in the packet. When the list of MAC addresses of the Interest packet arriving firstly at a provider, it will be used as the shortest path for Data packet’s forwarding. Furthermore, since nodes in the list are allowed to have priorities to access the channel, Data packets can be arrived at a consumer faster comparing to the conventional wireless CCNs. Unlike common unicasting routing protocols used in wireless ad-hoc networks, the Data packets is not forwarded only by the nodes in the list. The packet is also forwarded in some area of the nodes in the list. That is, the Data packets are flooded in a restricted area around the shortest path. Therefore, it achieves not only a better content download time, but also flooding of Data packets. 3.2. New Frames In the proposed protocol, Interest and Data packets’ formats of E-CHANET are modified as shown in Fig.1. As shown in Fig. 1(a), for the Interest packet of the proposed protocol, one field, called MACAddrList, is added at the end of the packet. This field includes MAC addresses of intermediate nodes between a consumer and a provider. When a node receives an Interest packet and decides to forward it, it adds its MAC address in the field. Therefore, MAC addresses are accumulated in the field as the Interest packet is forwarded to a Provider, so that the size of the field is varied according to the number of nodes forwarding the Interest packet before it arrives at a provider. This filed is also used for Data packet as shown in Fig. 1(b). The list of addresses in the field of Interest packet is copied to the field of Data packet by a provider before the Data packet is transmitted. While a node adds its MAC address into MACAddrList field when receiving an Interest packet, it removes its MAC address from the field of Data packet when it receives the data packet and its address is in the field. MaxHopCnt is the number of MAC addresses indicating how many nodes the Interest packet have come through from a consumer to the provider. HopCnt field in Data packet indicates how many hops the Data packet can be forwarded. That is, this limits forwarding Data packet unnecessary further. When a node receives a Data packet, it recalculates HopCnt which is explained in detail in Section 3.3. HopCnt is differently calculated depend on whether or not the node itself is in MACAddrList. 3.3. Operation of the proposed protocol In this section, operations of the protocol are explained in two parts: cases when a node receives Interest packet and Data packet. Process when a node receives an Interest packet. The procedure of the proposed protocol when a node receiving an Interest packet is shown in Fig. 2.
  • 5. Computer Science & Information Technology (CS & IT) 179 Figure. 2. Procedure of the proposed protocol when a node receives Interest packet When a node receives an Interest packet, it performs the process defined from conventional wireless CCN such as E-CHANET. That is, it checks CS and PIT and decides whether or not to forward the packet. If the node acts as a relay node and the received Interest packet needs to be forwarded, it add the last 24bits of its MAC address to MACAddrList field in the received Interest packet and forwards the packet to the neighbours. If the packet is already received before, the node discards the packet. If the node becomes a provider (that means it has the requested contents in its CS), it checks if it already received an Interest packet requesting same content and nonce number. If it did, it discards the packet. Otherwise, it records the first packet requesting the content with the nonce is received, and then at first, it copies the list in MACAddrList field in the Interest packet to MACAddrList field in Data packet to be sent. Secondly, it set HopCnt field to N times the number of MAC addresses in the field. Finally, it sends the Data packet to Consumer. In the process, when a provider receives an Interest packet, it sets MaxHopCnt to N x the number of MAC addresses in MACAddrList of the Interest packet. Process when a node receives a Data packet. When a node receives Data packet, it processes conventional CCN process. Then it checks if it need to forward the received Data packet. If it does not need to forward the packet, it discards the packet. If it need to forward it, but HopCnt is 0, it discards the packet. Otherwise, the node checks if there is its own MAC address in the MACAddrList of the Data packet. If there is, HopCnt of the Data packet is set to MaxHopCnt and the node’s own MAC address is removed from MACAddrList of the packet. In addition, after choosing random number between 0 and Ws, Receive Interest Operate basic CCN procedure Forward? Add MAC Address into MACAddrList of Interest packet Forward Interest Discard Interest packet Yes No Am I Provider? No Yes Copy MACAddrList from Interest packet to Data packet HopCnt = MaxhopCnt = N x # of MAC addresses in the list Send Data packet Is it the 1st Interest? No Yes
  • 6. 180 Computer Science & Information Technology (CS & IT) it sets its deferring time, DeferT, to the random number x slot time, SlotT. After waiting DeferT, it forwards the Data packet to neighbours. If there isn’t its own MAC address in the MACAddrList of the Data packet, the node checks if HopCnt of the packet equals to 1. If it is, HopCnt is set to 0. Otherwise, HopCnt is set to the integer that is not higher than root of HopCnt of the packet. After choosing random number between 0 and Wn, it sets its DeferT, to the random number x SlotT. After waiting DeferT, the packet is forwarded to the neighbours. The proposed protocol provides two unique characteristics to efficiently forward Data packets. The first characteristic is to limit the Data packet’s flooding by exponentially reducing HopCnt as explained in Step 4-2a. If a node receiving the Data packet coming from the non-shortest path, the Data packet is forwarded within number of hops. If it is coming from the shortest path, its Data packet is flooded as many hops as MaxHopCnt as explained in Step 4-1a. Therefore, it maintains an advantage of conventional CCN’s flooding as well as prevents from unnecessary packet flooding. The second characteristic is to give transmission priority to nodes on the shortest path as explained in Step 4-1c and 4-2c. In conventional wireless CCNs, since all data packets are broadcasted in MAC payer, there is no retransmissions and backoff time increase. Because of this, it causes lots of collisions due to concurrent transmissions. Therefore, to resolve concurrent transmissions, CCN layer provides Deferred Time which a node waits random time before transmission. In this case, to give better transmission opportunity to the nodes along with the shortest path, the proposed protocol allows them to choose random number from the smaller range of numbers (0~Ws) than other nodes. The other nodes choose the random number from the wider range of numbers (0~Wn). As a result, nodes on the shortest path have the higher transmission opportunities than others. Figure. 3. Network Topology for the simulations Consumer Provider
  • 7. Computer Science & Information Technology (CS & IT) 181 Figure. 4. Average content download time as a function of the distance between a consumer-provider pair 4. PERFORMANCE EVALUATIONS In this section, the proposed protocol is comparatively evaluated with E-CHANET-based protocol. For evaluation studies, we have used ndnSIM [10] software module that is based on Network Simulator-3 (NS-3) version 3.16. In the simulations, one content consists of 100 packets and payload length of a data packet is set to 1200 bytes. Physical layer transmission rate is set to 6Mbps and 5GHz-carrier frequency-based IEEE802.11a standard is adopted. Medium access control protocol is based on IEEE802.11e standard. For the channel model, log normal path loss model with path loss exponent 3 is used. The simulations results are collected from 100 times simulations and one simulation completed when a consumer receives all 100 chunks packets from a provider. The performances are evaluated as functions of network sizes by varying distances of a consumer-provider pair and the number of lines of Y-axis in grid topology. The topology for the simulations are shown in Fig. 3. Fixing a consumer’s location, performances are evaluated varying distances to a provider. The distances are 5, 10, 15, 20 hops. In addition to varying distances between the consumer and the provider, the grid sizes are varied as like 5 and 15 lines. 1 line means there is only one path between the consumer and the provider. That is, the number of hop indicates the number of relay nodes in x-axis over grid topology while the number of lines indicates the number of relay nodes in y-axis in the topology. Therefore, we evaluates the performances over 8 sizes of networks (4 types of hops and 2 types of lines). Fig. 4 shows the average content download time as varying the distance between a consumer and provider when the numbers of lines are 5 and 15. As mentioned before, the distance is represented using the number of hops between the consumer-provider pair and the distance is varied from 5 to 20 hops. As shown in the figure, the proposed protocol reduces the download time from 16% to 52% comparing to E-CHANET protocol. From the figure, as the distance increases, the reduction of download time is larger. The reason is because E-CHANET protocol makes more packets flooded over the networks as the distance increase. Since higher traffics over 5 10 15 20 0 5 10 15 20 25 30 35 40 Number of Hops AverageContentsDownloadTime(sec) E-CHANET w/ 5-line Proposed w/ 5-line E-CHANET w/ 15-line Proposed w/ 15-line E-CHANET 15 lines 5 lines Proposed
  • 8. 182 Computer Science & Information Technology (CS & IT) the networks causes higher download time because of packet losses due to collisions and longer backoff time in MAC layer. It is noticed that there is exceptionally long download time of E- CHANET protocol in 5 lines in Fig. 4. This can be explained from Fig. 5 showing the average number of retries. As Fig. 5 shows, E-CHANET protocol has the highest number of retries. Since the forwarding path becomes narrower, the advantage of E-CHANET protocol’s flooding-based Data packet forwarding decreases. Even though flooding-based packet forwarding method cause lots of collisions because too many nodes are participating in transmissions, the packet can eventually delivered to the consumer through many alternative paths because it is flooded. However, in the narrower network like 5 lines, the number of alternative paths are limited, so that the advantage of flooding decreases. Therefore, the number of retransmissions increases which leads the download time’s increase. Figure. 5. Average number of retries as a function of the distance between a consumer-provider pair 5. CONCLUSIONS In this paper, a novel protocol for wireless CCNs is proposed. Even though the protocol uses broadcasting and flooding-based Data packet forwarding, by restricting flooding area and giving transmission priority to a nodes on the shortest path, the protocol resolves the long content download time issue. The proposed protocol is evaluated throughout extensive simulations and it is proved that the objective of the proposed protocol successfully achieved by reducing a content download time up to 50% comparing to the conventional protocol. ACKNOWLEDGEMENTS This research was supported in parts by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education (2013R1A1A2005692) and in parts by the International Science and Business Belt Program through the Ministry of Science, ICT and Future Planning (2015K000270).
  • 9. Computer Science & Information Technology (CS & IT) 183 REFERENCES [1] V. Jacobson, D.K. Smetters, J.D. Thornton, M.F. Plass, N.H. Briggs, and R.L. Braynard, “Networking named content,” Proc. Int. Conf. on Emerging Networking Experiments and Technologies, (CoNEXT’09), Rome, Italy, Dec. 2009. pp. 1-12. [2] M. Amadeo, A. Molinaro, and G. Ruggeri, "E-CHANET: routing, forwarding and transport in information-centric multihop wireless networks," Computer Communications, vol. 36, no. 7, pp. 792- 803, April 2013. [3] M Amadeo, C Campolo, and A Molinaro, "Enhancing content-centric networking for vehicular environments," Computer Networks, vol. 57, no. 16, pp. 3222-3234, November. 2013. [4] O. Adem, S. Kang, Y.B. Ko, "Packet Loss Avoidance in Content Centric Mobile Adhoc Netowrks," 15th International Conference on Advanced Communication Technology (ICACT’13), pp. 245-250, PyeongChang, Korea, January 2013. [5] H. Han, M. Wu, Q. Hu, and N. Wang, "Best Route, Error Broadcast: A Content-Centric Forwarding Protocol for MANETs," IEEE 80th Vehicular Technology Conference (VTC Fall), pp. 14-17, Vancouver, Canada, September 2014. [6] Y.-T. Yu, B.R. Dilmaghani, S. Calo, M.Y. Sanadidi, and M. Gerla, “Interest propagation in named data manets," in Proc. of IEEE International Conference on Computing, Networking, and Communications (ICNC’2013), pp. 1118-1122, San Diego, CA, January 2013. [7] D. Kim and Y.-B. Ko, “A novel message broadcasting strategy for reliable content retrieval in multi- hop wireless content centric networks,” In Proceedings of the 9th ACM International Conference on Ubiquitous Information Management and Communication, Bali, Indonesia, January 2015. [8] R.A. Rehman and B.-S. Kim, “Energy aware forwarding in content centric based multihop wireless ad hoc networks,” IEICE transactions on on Fundamentals of Electronics, Communications and Computer Sciences,vol. E98-A, no. 12, pp. 2738-2742, December 2015. [9] M. Amadeo, C. Campolo, and A. Molinaro, “Forwarding strategies in named data wireless ad hoc networks: Design and evaluation,” Journal of Network and Computer Applications, vol. 50, pp. 148- 158, April 2015. [10] D. Kim, J.-H. Kim, C. Moon, J. Choi, and I. Yeom, “Efficient content delivery in mobile ad-hoc networks using ccn,” Ad Hoc Networks, vol. 36, pp. 81-99, January 2016. [11] A. Afanasyev, I. Moiseenko, and L. Zhang, “ndnSIM: NDN simulator for NS-3,” Technical Report NDN-0005, NDN, October 2012.