SlideShare a Scribd company logo
1 of 21
Caching in Information Centric
Network (ICN)
Presented by: Priagung Khusumanegara
Outline
 Introduction
 Characteristics of caching in ICN
 Transparent
 Ubiquitous
 Fine Granularity
 Caching optimization in ICN
 Dimensioning
 Decision policy
 Challenges and future research2
Introduction
One of the important features of ICN is
caching
 Speed up content distribution
 Improve network resource utilization
Characteristics of caching in ICN
 Transparent
 Ubiquitous
 Fine granularity3
Transparent
 Making its routing and caching decisions on unified content
names, essentially making these names network aware.
 Several Challenges:
 Inconsistency between caching objective
 ICN should make reasonable choice of its caching objective to
balance between diverse traffic types.
 Cross-application competitive sharing of cache space
 Different types of traffic differ significantly in their population
scale, object size and object popularity.
 ICN have to be able to efficiently share cache resources
between different traffic types.
 Line rate operation of caches
 The cache management quite different from traditional disk-
based management.
4
Ubiquitous
 Topology of the cache network evolves from hierarchical trees to arbitrary
graphs.
 ICN more dynamics because its general cache network topology, ubiquity of
in network caches and volatility of cached content.
5
Traditional Caching System
Focus on
Hierarchical Tree
Evolution
Information Centric Network
Focus on
Arbitrary Graph
Fine Granularity
 Different options for the granularity of caching:
 File-level
o Caching individual files as transmitted through the network
o Typical size 1.5 Kb each – as proposed by CNN
 Chunk-level
o Caching information chunks
o An information object is split into a number of fixed-size
information chucks – as proposed by ICN
6
Fine Granularity (Cont’d)
Change of cache unit raises the following issues:
 Change of popularity
o Different chunks of a single file can have different access frequencies.
 Failure of independent reference assumption
o Traditional file-based caches are based on independent reference
model
o Requests for different chunks of the same file are often correlated, e.g.
in sequential order
 Opportunity for more efficient use of the cache space
o It possible to retrieve different parts of the same file from different
nodes, which speeds up the retrieval rate and improves the space
utilization.
7
Techniques for ICN performance
optimization
 Focus on:
– Cache dimensioning
– Cache decision policy
8
Cache Dimensioning
- Since ICN cache should operate at line rate, the cache
size that can be installed at each caching node is thus
limited.
- There are two issues that remain to be addressed:
 How large the cache space should be to have noticeable
performance improvement?
o Preferred to configure the cache size based on the router’s
performance disparity.
 How to allocate the storage resource across different cache nodes?
o Degree based allocation: the cache capacity allocated to a node
is proportional to its node degree.
9
Cache Decision Policy
 Cache decision policy
– It determines which objects are to be placed at
which cache nodes.
– Two kinds of cache decision policy
 Explicit cache coordination decision
 Implicit cache coordination
10
Explicit Cache Coordination
 Object access pattern, cache network topology and
each cache’s state as input for the calculation of the
placement position of each object.
 Common approaches can be classified into
three categories:
– Global
– Path
– Neighborhood
11
Explicit Cache Coordination
(Cont’d)
 Global coordination
– Involves all cache nodes
– Object placement based on network distance between
cache nodes and object access frequencies at each cache
node
 Path coordination
– Only involves the cache nodes along the path from the
request hit place to the requesting client
– e.g.: en-route web caching
12
Explicit Cache Coordination
(Cont’d)
 Neighborhood coordination
– Coordination takes place among a node’s
neighborhood.
– E.g.: Cooperative In-Network Caching (CINC)
13 Figure: The operation of coordination in network caching (CINC)
Implicit Cache Coordination
 Each node does not need to know the state
information of other cache nodes
 LCE (leave copy everywhere)
– Copy the object at each node along the
downloading path
– Disadvantage: Degrade the performance of the
network and underutilize some of the network
resources.
14
Implicit Cache Coordination
(Cont’d)
 Leave Copy Down (LCD):
– When a cache hit occurs, this scheme only
caches the object at the direct downstream node
– Avoid a large number of copies of the same
object15
Figure: LCD (Leave Copy Down)
Implicit Cache Coordination
(Cont’d)
 Move Copy Down (MCD):
– This scheme moves the object from the hit node
to its direct downstream node, and deletes the
object from the hit node.
16
Figure: MCD (Move Copy Down)
Implicit Cache Coordination
(Cont’d)
 Copy with Probability
- The requested object is copied with a given
probability p at each node along the returning
path
17
Figure: Copy with Probability
Implicit Cache Coordination
(Cont’d)
 Random Copy One
- The requested object is copied at one random
node along the returning path
18 Figure: Random Copy One
Implicit Cache Coordination
(Cont’d)
 Probability Cache
- The requested object is copied at each node with
a probability. But, for each node, the probability
varies.
19 Figure: Probability Cache
Correlation Between Cache
Decisions
- WAVE adjusts the number of chunks cached at
each node based on the file’s popularity
- When the number of requests for a file increases,
WAVE reacts with exponential increase in the
number of chucks cached for this file.
- A content router in WAVE explicitly sets the cache
indication mark
- Once the chunk is cached, the cache indication
mark is cleared.
20
Figure: Operation of WAVE
Challenges and Future Direction
 Cache object popularity
– Establish the chunk- level object popularity model from prior knowledge
– Measure the chunk-level object popularity directly
 Correlation between requests and correlation-based
cache decision
– What is the inherent correlation between different requests,
– How to model this correlation, and
– How to optimize the cache decision policy based on the request
correlation,
 ICN friendly network topology
– What kind of network topology is suitable for ICN network.
21

More Related Content

What's hot

Advanced Operating System Lecture Notes
Advanced Operating System Lecture NotesAdvanced Operating System Lecture Notes
Advanced Operating System Lecture NotesAnirudhan Guru
 
Flynns classification
Flynns classificationFlynns classification
Flynns classificationYasir Khan
 
CS6010 Social Network Analysis Unit II
CS6010 Social Network Analysis   Unit IICS6010 Social Network Analysis   Unit II
CS6010 Social Network Analysis Unit IIpkaviya
 
Wsn routing protocol
Wsn routing protocolWsn routing protocol
Wsn routing protocolSuganthiN2
 
Computer networks network layer,routing
Computer networks network layer,routingComputer networks network layer,routing
Computer networks network layer,routingDeepak John
 
Structure of shared memory space
Structure of shared memory spaceStructure of shared memory space
Structure of shared memory spaceCoder Tech
 
Introduction to Parallel and Distributed Computing
Introduction to Parallel and Distributed ComputingIntroduction to Parallel and Distributed Computing
Introduction to Parallel and Distributed ComputingSayed Chhattan Shah
 
CS9222 ADVANCED OPERATING SYSTEMS
CS9222 ADVANCED OPERATING SYSTEMSCS9222 ADVANCED OPERATING SYSTEMS
CS9222 ADVANCED OPERATING SYSTEMSKathirvel Ayyaswamy
 
Multiple Access in Computer Network
Multiple Access in Computer NetworkMultiple Access in Computer Network
Multiple Access in Computer NetworkHitesh Mohapatra
 
Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)ArunChokkalingam
 
IT8602 Mobile Communication - Unit III
IT8602 Mobile Communication  - Unit IIIIT8602 Mobile Communication  - Unit III
IT8602 Mobile Communication - Unit IIIpkaviya
 
Unit 6 interprocessor arbitration
Unit 6 interprocessor arbitrationUnit 6 interprocessor arbitration
Unit 6 interprocessor arbitrationDipesh Vaya
 
OpenMP Tutorial for Beginners
OpenMP Tutorial for BeginnersOpenMP Tutorial for Beginners
OpenMP Tutorial for BeginnersDhanashree Prasad
 
Data retrieval in sensor networks
Data retrieval in sensor networksData retrieval in sensor networks
Data retrieval in sensor networksAcad
 
Mobile ip overview
Mobile ip overviewMobile ip overview
Mobile ip overviewpriya Nithya
 
Presentation on flynn’s classification
Presentation on flynn’s classificationPresentation on flynn’s classification
Presentation on flynn’s classificationvani gupta
 
Key mechanism of mobile ip
Key mechanism of mobile ip Key mechanism of mobile ip
Key mechanism of mobile ip priya Nithya
 

What's hot (20)

Introduction to Hadoop
Introduction to HadoopIntroduction to Hadoop
Introduction to Hadoop
 
Hybrid wireless protocols
Hybrid wireless protocolsHybrid wireless protocols
Hybrid wireless protocols
 
Advanced Operating System Lecture Notes
Advanced Operating System Lecture NotesAdvanced Operating System Lecture Notes
Advanced Operating System Lecture Notes
 
Flynns classification
Flynns classificationFlynns classification
Flynns classification
 
CS6010 Social Network Analysis Unit II
CS6010 Social Network Analysis   Unit IICS6010 Social Network Analysis   Unit II
CS6010 Social Network Analysis Unit II
 
Wsn routing protocol
Wsn routing protocolWsn routing protocol
Wsn routing protocol
 
Computer networks network layer,routing
Computer networks network layer,routingComputer networks network layer,routing
Computer networks network layer,routing
 
Structure of shared memory space
Structure of shared memory spaceStructure of shared memory space
Structure of shared memory space
 
Introduction to Parallel and Distributed Computing
Introduction to Parallel and Distributed ComputingIntroduction to Parallel and Distributed Computing
Introduction to Parallel and Distributed Computing
 
CS9222 ADVANCED OPERATING SYSTEMS
CS9222 ADVANCED OPERATING SYSTEMSCS9222 ADVANCED OPERATING SYSTEMS
CS9222 ADVANCED OPERATING SYSTEMS
 
Multiple Access in Computer Network
Multiple Access in Computer NetworkMultiple Access in Computer Network
Multiple Access in Computer Network
 
Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)Destination Sequenced Distance Vector Routing (DSDV)
Destination Sequenced Distance Vector Routing (DSDV)
 
IT8602 Mobile Communication - Unit III
IT8602 Mobile Communication  - Unit IIIIT8602 Mobile Communication  - Unit III
IT8602 Mobile Communication - Unit III
 
Unit 6 interprocessor arbitration
Unit 6 interprocessor arbitrationUnit 6 interprocessor arbitration
Unit 6 interprocessor arbitration
 
OpenMP Tutorial for Beginners
OpenMP Tutorial for BeginnersOpenMP Tutorial for Beginners
OpenMP Tutorial for Beginners
 
Data retrieval in sensor networks
Data retrieval in sensor networksData retrieval in sensor networks
Data retrieval in sensor networks
 
Mobile ip overview
Mobile ip overviewMobile ip overview
Mobile ip overview
 
Parallel processing and pipelining
Parallel processing and pipeliningParallel processing and pipelining
Parallel processing and pipelining
 
Presentation on flynn’s classification
Presentation on flynn’s classificationPresentation on flynn’s classification
Presentation on flynn’s classification
 
Key mechanism of mobile ip
Key mechanism of mobile ip Key mechanism of mobile ip
Key mechanism of mobile ip
 

Similar to Caching in Information Centric Network (ICN)

JPD1421 Content Caching and Scheduling in Wireless Networks With Elastic and...
JPD1421  Content Caching and Scheduling in Wireless Networks With Elastic and...JPD1421  Content Caching and Scheduling in Wireless Networks With Elastic and...
JPD1421 Content Caching and Scheduling in Wireless Networks With Elastic and...chennaijp
 
Survey paper _ lakshmi yasaswi kamireddy(651771619)
Survey paper _ lakshmi yasaswi kamireddy(651771619)Survey paper _ lakshmi yasaswi kamireddy(651771619)
Survey paper _ lakshmi yasaswi kamireddy(651771619)Lakshmi Yasaswi Kamireddy
 
2014 IEEE DOTNET NETWORKING PROJECT Content caching-and-scheduling-in-wireles...
2014 IEEE DOTNET NETWORKING PROJECT Content caching-and-scheduling-in-wireles...2014 IEEE DOTNET NETWORKING PROJECT Content caching-and-scheduling-in-wireles...
2014 IEEE DOTNET NETWORKING PROJECT Content caching-and-scheduling-in-wireles...IEEEFINALSEMSTUDENTSPROJECTS
 
A New Efficient Cache Replacement Strategy for Named Data Networking
A New Efficient Cache Replacement Strategy for Named Data NetworkingA New Efficient Cache Replacement Strategy for Named Data Networking
A New Efficient Cache Replacement Strategy for Named Data NetworkingIJCNCJournal
 
A NEW EFFICIENT CACHE REPLACEMENT STRATEGY FOR NAMED DATA NETWORKING
A NEW EFFICIENT CACHE REPLACEMENT STRATEGY FOR NAMED DATA NETWORKINGA NEW EFFICIENT CACHE REPLACEMENT STRATEGY FOR NAMED DATA NETWORKING
A NEW EFFICIENT CACHE REPLACEMENT STRATEGY FOR NAMED DATA NETWORKINGIJCNCJournal
 
OpenEBS; asymmetrical block layer in user-space breaking the million IOPS bar...
OpenEBS; asymmetrical block layer in user-space breaking the million IOPS bar...OpenEBS; asymmetrical block layer in user-space breaking the million IOPS bar...
OpenEBS; asymmetrical block layer in user-space breaking the million IOPS bar...MayaData
 
International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...ijcseit
 
Age-based Cooperative Caching in Information-Centric Networks
Age-based Cooperative Caching in Information-Centric NetworksAge-based Cooperative Caching in Information-Centric Networks
Age-based Cooperative Caching in Information-Centric NetworksShi Junxiao
 
MayaData Datastax webinar - Operating Cassandra on Kubernetes with the help ...
MayaData  Datastax webinar - Operating Cassandra on Kubernetes with the help ...MayaData  Datastax webinar - Operating Cassandra on Kubernetes with the help ...
MayaData Datastax webinar - Operating Cassandra on Kubernetes with the help ...MayaData Inc
 
Survey on caching and replication algorithm for content distribution in peer ...
Survey on caching and replication algorithm for content distribution in peer ...Survey on caching and replication algorithm for content distribution in peer ...
Survey on caching and replication algorithm for content distribution in peer ...ijcseit
 
Managing Multidimensional Historical
Managing Multidimensional HistoricalManaging Multidimensional Historical
Managing Multidimensional HistoricalArul Suju
 
content caching and scheduling in wireless networks with elastic and inelasti...
content caching and scheduling in wireless networks with elastic and inelasti...content caching and scheduling in wireless networks with elastic and inelasti...
content caching and scheduling in wireless networks with elastic and inelasti...swathi78
 
VIRTUAL CACHE & VIRTUAL WAN ACCELERATOR FUNCTION PLACEMENT FOR COST-EFFECTIVE...
VIRTUAL CACHE & VIRTUAL WAN ACCELERATOR FUNCTION PLACEMENT FOR COST-EFFECTIVE...VIRTUAL CACHE & VIRTUAL WAN ACCELERATOR FUNCTION PLACEMENT FOR COST-EFFECTIVE...
VIRTUAL CACHE & VIRTUAL WAN ACCELERATOR FUNCTION PLACEMENT FOR COST-EFFECTIVE...IJCNCJournal
 
Load balancing in Content Delivery Networks in Novel Distributed Equilibrium
Load balancing in Content Delivery Networks in Novel Distributed EquilibriumLoad balancing in Content Delivery Networks in Novel Distributed Equilibrium
Load balancing in Content Delivery Networks in Novel Distributed EquilibriumIJMER
 
Ijmer 46068390
Ijmer 46068390Ijmer 46068390
Ijmer 46068390IJMER
 
Selective placement of caches for hash based off-path caching in icn slides
Selective placement of caches for hash based off-path caching in icn slidesSelective placement of caches for hash based off-path caching in icn slides
Selective placement of caches for hash based off-path caching in icn slidesAnshuman Kalla
 
Cache performance analysis of virtualized router on virtual content centric n...
Cache performance analysis of virtualized router on virtual content centric n...Cache performance analysis of virtualized router on virtual content centric n...
Cache performance analysis of virtualized router on virtual content centric n...ijngnjournal
 

Similar to Caching in Information Centric Network (ICN) (20)

Cc
CcCc
Cc
 
JPD1421 Content Caching and Scheduling in Wireless Networks With Elastic and...
JPD1421  Content Caching and Scheduling in Wireless Networks With Elastic and...JPD1421  Content Caching and Scheduling in Wireless Networks With Elastic and...
JPD1421 Content Caching and Scheduling in Wireless Networks With Elastic and...
 
Survey paper _ lakshmi yasaswi kamireddy(651771619)
Survey paper _ lakshmi yasaswi kamireddy(651771619)Survey paper _ lakshmi yasaswi kamireddy(651771619)
Survey paper _ lakshmi yasaswi kamireddy(651771619)
 
2014 IEEE DOTNET NETWORKING PROJECT Content caching-and-scheduling-in-wireles...
2014 IEEE DOTNET NETWORKING PROJECT Content caching-and-scheduling-in-wireles...2014 IEEE DOTNET NETWORKING PROJECT Content caching-and-scheduling-in-wireles...
2014 IEEE DOTNET NETWORKING PROJECT Content caching-and-scheduling-in-wireles...
 
A New Efficient Cache Replacement Strategy for Named Data Networking
A New Efficient Cache Replacement Strategy for Named Data NetworkingA New Efficient Cache Replacement Strategy for Named Data Networking
A New Efficient Cache Replacement Strategy for Named Data Networking
 
A NEW EFFICIENT CACHE REPLACEMENT STRATEGY FOR NAMED DATA NETWORKING
A NEW EFFICIENT CACHE REPLACEMENT STRATEGY FOR NAMED DATA NETWORKINGA NEW EFFICIENT CACHE REPLACEMENT STRATEGY FOR NAMED DATA NETWORKING
A NEW EFFICIENT CACHE REPLACEMENT STRATEGY FOR NAMED DATA NETWORKING
 
Lecture2
Lecture2Lecture2
Lecture2
 
OpenEBS; asymmetrical block layer in user-space breaking the million IOPS bar...
OpenEBS; asymmetrical block layer in user-space breaking the million IOPS bar...OpenEBS; asymmetrical block layer in user-space breaking the million IOPS bar...
OpenEBS; asymmetrical block layer in user-space breaking the million IOPS bar...
 
International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...
 
Age-based Cooperative Caching in Information-Centric Networks
Age-based Cooperative Caching in Information-Centric NetworksAge-based Cooperative Caching in Information-Centric Networks
Age-based Cooperative Caching in Information-Centric Networks
 
MayaData Datastax webinar - Operating Cassandra on Kubernetes with the help ...
MayaData  Datastax webinar - Operating Cassandra on Kubernetes with the help ...MayaData  Datastax webinar - Operating Cassandra on Kubernetes with the help ...
MayaData Datastax webinar - Operating Cassandra on Kubernetes with the help ...
 
Survey on caching and replication algorithm for content distribution in peer ...
Survey on caching and replication algorithm for content distribution in peer ...Survey on caching and replication algorithm for content distribution in peer ...
Survey on caching and replication algorithm for content distribution in peer ...
 
Managing Multidimensional Historical
Managing Multidimensional HistoricalManaging Multidimensional Historical
Managing Multidimensional Historical
 
content caching and scheduling in wireless networks with elastic and inelasti...
content caching and scheduling in wireless networks with elastic and inelasti...content caching and scheduling in wireless networks with elastic and inelasti...
content caching and scheduling in wireless networks with elastic and inelasti...
 
An efficient multi-level cache system for geometrically interconnected many-...
An efficient multi-level cache system for geometrically  interconnected many-...An efficient multi-level cache system for geometrically  interconnected many-...
An efficient multi-level cache system for geometrically interconnected many-...
 
VIRTUAL CACHE & VIRTUAL WAN ACCELERATOR FUNCTION PLACEMENT FOR COST-EFFECTIVE...
VIRTUAL CACHE & VIRTUAL WAN ACCELERATOR FUNCTION PLACEMENT FOR COST-EFFECTIVE...VIRTUAL CACHE & VIRTUAL WAN ACCELERATOR FUNCTION PLACEMENT FOR COST-EFFECTIVE...
VIRTUAL CACHE & VIRTUAL WAN ACCELERATOR FUNCTION PLACEMENT FOR COST-EFFECTIVE...
 
Load balancing in Content Delivery Networks in Novel Distributed Equilibrium
Load balancing in Content Delivery Networks in Novel Distributed EquilibriumLoad balancing in Content Delivery Networks in Novel Distributed Equilibrium
Load balancing in Content Delivery Networks in Novel Distributed Equilibrium
 
Ijmer 46068390
Ijmer 46068390Ijmer 46068390
Ijmer 46068390
 
Selective placement of caches for hash based off-path caching in icn slides
Selective placement of caches for hash based off-path caching in icn slidesSelective placement of caches for hash based off-path caching in icn slides
Selective placement of caches for hash based off-path caching in icn slides
 
Cache performance analysis of virtualized router on virtual content centric n...
Cache performance analysis of virtualized router on virtual content centric n...Cache performance analysis of virtualized router on virtual content centric n...
Cache performance analysis of virtualized router on virtual content centric n...
 

More from Lippo Group Digital

Behavior-Based Authentication System Based on Smartphone Life-Logs Data
Behavior-Based Authentication System Based on Smartphone Life-Logs DataBehavior-Based Authentication System Based on Smartphone Life-Logs Data
Behavior-Based Authentication System Based on Smartphone Life-Logs DataLippo Group Digital
 
A web based iptv content syndication system for personalized content guide
A web based iptv content syndication system for personalized content guideA web based iptv content syndication system for personalized content guide
A web based iptv content syndication system for personalized content guideLippo Group Digital
 
Time-based DDoS Detection and Mitigation for SDN Controller
Time-based DDoS Detection and Mitigation for SDN ControllerTime-based DDoS Detection and Mitigation for SDN Controller
Time-based DDoS Detection and Mitigation for SDN ControllerLippo Group Digital
 
Profiler for Smartphone Users Interests Using Modified Hierarchical Agglomera...
Profiler for Smartphone Users Interests Using Modified Hierarchical Agglomera...Profiler for Smartphone Users Interests Using Modified Hierarchical Agglomera...
Profiler for Smartphone Users Interests Using Modified Hierarchical Agglomera...Lippo Group Digital
 
Analisis performa kecepatan mapreduce pada hadoop menggunakan tcp packet flow...
Analisis performa kecepatan mapreduce pada hadoop menggunakan tcp packet flow...Analisis performa kecepatan mapreduce pada hadoop menggunakan tcp packet flow...
Analisis performa kecepatan mapreduce pada hadoop menggunakan tcp packet flow...Lippo Group Digital
 
Analisa pengaruh block size pada hdfs terhadap kecepatan
Analisa pengaruh block size pada hdfs terhadap kecepatanAnalisa pengaruh block size pada hdfs terhadap kecepatan
Analisa pengaruh block size pada hdfs terhadap kecepatanLippo Group Digital
 

More from Lippo Group Digital (13)

Behavior-Based Authentication System Based on Smartphone Life-Logs Data
Behavior-Based Authentication System Based on Smartphone Life-Logs DataBehavior-Based Authentication System Based on Smartphone Life-Logs Data
Behavior-Based Authentication System Based on Smartphone Life-Logs Data
 
Domain specific IoT
Domain specific IoTDomain specific IoT
Domain specific IoT
 
Feature Selection
Feature Selection Feature Selection
Feature Selection
 
Fall detection
Fall detectionFall detection
Fall detection
 
The Cognitive Net is Coming
The Cognitive Net is ComingThe Cognitive Net is Coming
The Cognitive Net is Coming
 
The future internet web 3.0
The future internet  web 3.0The future internet  web 3.0
The future internet web 3.0
 
A web based iptv content syndication system for personalized content guide
A web based iptv content syndication system for personalized content guideA web based iptv content syndication system for personalized content guide
A web based iptv content syndication system for personalized content guide
 
Time-based DDoS Detection and Mitigation for SDN Controller
Time-based DDoS Detection and Mitigation for SDN ControllerTime-based DDoS Detection and Mitigation for SDN Controller
Time-based DDoS Detection and Mitigation for SDN Controller
 
Distance function
Distance functionDistance function
Distance function
 
Decision tree and random forest
Decision tree and random forestDecision tree and random forest
Decision tree and random forest
 
Profiler for Smartphone Users Interests Using Modified Hierarchical Agglomera...
Profiler for Smartphone Users Interests Using Modified Hierarchical Agglomera...Profiler for Smartphone Users Interests Using Modified Hierarchical Agglomera...
Profiler for Smartphone Users Interests Using Modified Hierarchical Agglomera...
 
Analisis performa kecepatan mapreduce pada hadoop menggunakan tcp packet flow...
Analisis performa kecepatan mapreduce pada hadoop menggunakan tcp packet flow...Analisis performa kecepatan mapreduce pada hadoop menggunakan tcp packet flow...
Analisis performa kecepatan mapreduce pada hadoop menggunakan tcp packet flow...
 
Analisa pengaruh block size pada hdfs terhadap kecepatan
Analisa pengaruh block size pada hdfs terhadap kecepatanAnalisa pengaruh block size pada hdfs terhadap kecepatan
Analisa pengaruh block size pada hdfs terhadap kecepatan
 

Recently uploaded

WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 

Recently uploaded (20)

WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 

Caching in Information Centric Network (ICN)

  • 1. Caching in Information Centric Network (ICN) Presented by: Priagung Khusumanegara
  • 2. Outline  Introduction  Characteristics of caching in ICN  Transparent  Ubiquitous  Fine Granularity  Caching optimization in ICN  Dimensioning  Decision policy  Challenges and future research2
  • 3. Introduction One of the important features of ICN is caching  Speed up content distribution  Improve network resource utilization Characteristics of caching in ICN  Transparent  Ubiquitous  Fine granularity3
  • 4. Transparent  Making its routing and caching decisions on unified content names, essentially making these names network aware.  Several Challenges:  Inconsistency between caching objective  ICN should make reasonable choice of its caching objective to balance between diverse traffic types.  Cross-application competitive sharing of cache space  Different types of traffic differ significantly in their population scale, object size and object popularity.  ICN have to be able to efficiently share cache resources between different traffic types.  Line rate operation of caches  The cache management quite different from traditional disk- based management. 4
  • 5. Ubiquitous  Topology of the cache network evolves from hierarchical trees to arbitrary graphs.  ICN more dynamics because its general cache network topology, ubiquity of in network caches and volatility of cached content. 5 Traditional Caching System Focus on Hierarchical Tree Evolution Information Centric Network Focus on Arbitrary Graph
  • 6. Fine Granularity  Different options for the granularity of caching:  File-level o Caching individual files as transmitted through the network o Typical size 1.5 Kb each – as proposed by CNN  Chunk-level o Caching information chunks o An information object is split into a number of fixed-size information chucks – as proposed by ICN 6
  • 7. Fine Granularity (Cont’d) Change of cache unit raises the following issues:  Change of popularity o Different chunks of a single file can have different access frequencies.  Failure of independent reference assumption o Traditional file-based caches are based on independent reference model o Requests for different chunks of the same file are often correlated, e.g. in sequential order  Opportunity for more efficient use of the cache space o It possible to retrieve different parts of the same file from different nodes, which speeds up the retrieval rate and improves the space utilization. 7
  • 8. Techniques for ICN performance optimization  Focus on: – Cache dimensioning – Cache decision policy 8
  • 9. Cache Dimensioning - Since ICN cache should operate at line rate, the cache size that can be installed at each caching node is thus limited. - There are two issues that remain to be addressed:  How large the cache space should be to have noticeable performance improvement? o Preferred to configure the cache size based on the router’s performance disparity.  How to allocate the storage resource across different cache nodes? o Degree based allocation: the cache capacity allocated to a node is proportional to its node degree. 9
  • 10. Cache Decision Policy  Cache decision policy – It determines which objects are to be placed at which cache nodes. – Two kinds of cache decision policy  Explicit cache coordination decision  Implicit cache coordination 10
  • 11. Explicit Cache Coordination  Object access pattern, cache network topology and each cache’s state as input for the calculation of the placement position of each object.  Common approaches can be classified into three categories: – Global – Path – Neighborhood 11
  • 12. Explicit Cache Coordination (Cont’d)  Global coordination – Involves all cache nodes – Object placement based on network distance between cache nodes and object access frequencies at each cache node  Path coordination – Only involves the cache nodes along the path from the request hit place to the requesting client – e.g.: en-route web caching 12
  • 13. Explicit Cache Coordination (Cont’d)  Neighborhood coordination – Coordination takes place among a node’s neighborhood. – E.g.: Cooperative In-Network Caching (CINC) 13 Figure: The operation of coordination in network caching (CINC)
  • 14. Implicit Cache Coordination  Each node does not need to know the state information of other cache nodes  LCE (leave copy everywhere) – Copy the object at each node along the downloading path – Disadvantage: Degrade the performance of the network and underutilize some of the network resources. 14
  • 15. Implicit Cache Coordination (Cont’d)  Leave Copy Down (LCD): – When a cache hit occurs, this scheme only caches the object at the direct downstream node – Avoid a large number of copies of the same object15 Figure: LCD (Leave Copy Down)
  • 16. Implicit Cache Coordination (Cont’d)  Move Copy Down (MCD): – This scheme moves the object from the hit node to its direct downstream node, and deletes the object from the hit node. 16 Figure: MCD (Move Copy Down)
  • 17. Implicit Cache Coordination (Cont’d)  Copy with Probability - The requested object is copied with a given probability p at each node along the returning path 17 Figure: Copy with Probability
  • 18. Implicit Cache Coordination (Cont’d)  Random Copy One - The requested object is copied at one random node along the returning path 18 Figure: Random Copy One
  • 19. Implicit Cache Coordination (Cont’d)  Probability Cache - The requested object is copied at each node with a probability. But, for each node, the probability varies. 19 Figure: Probability Cache
  • 20. Correlation Between Cache Decisions - WAVE adjusts the number of chunks cached at each node based on the file’s popularity - When the number of requests for a file increases, WAVE reacts with exponential increase in the number of chucks cached for this file. - A content router in WAVE explicitly sets the cache indication mark - Once the chunk is cached, the cache indication mark is cleared. 20 Figure: Operation of WAVE
  • 21. Challenges and Future Direction  Cache object popularity – Establish the chunk- level object popularity model from prior knowledge – Measure the chunk-level object popularity directly  Correlation between requests and correlation-based cache decision – What is the inherent correlation between different requests, – How to model this correlation, and – How to optimize the cache decision policy based on the request correlation,  ICN friendly network topology – What kind of network topology is suitable for ICN network. 21