SlideShare a Scribd company logo
Cache “Less for More” in Information-
Centric Networks
W. K. Chai, D. He, I. Psaras and G. Pavlou (presenter)
Department of Electronic & Electrical Engineering
University College London
London WC1E 6EA
United Kingdom
Background: Caching in Information-Centric
Networking (ICN)
• In Information-Centric Networking (ICN), contents are named.
• Content requests can be served from any node having the content
identified by the content name.
• ICN features ubiquitous in-network caching:
– potentially every router caching indiscriminately all content fragments
that traverse it
– if a matching request is received while a fragment is still in its cache
store, it will be forwarded to the requester from that element, avoiding
going to the hosting server.
• Specifically, NNC* proposes:
– A router caches every content chunk that traverses it with the
assumption that routers are equipped with (large) cache stores.
– A least recently used (LRU) cache eviction policy is used.
2*V. Jacobson, et al., “Networking Named Content,” Proc. ACM CoNEXT, 2009, pp. 1-12.
Argument & Objective
• The Argument: indiscriminate universal caching strategy is
unnecessarily costly and sub-optimal
– High content replacement frequency may result in content
being replaced before getting a hit.
• The Objective: to study alternative in-network caching
strategies for enhancing the overall content delivery
performance.
– We address the central question of whether caching only at
specific sub-set of node(s) en route the delivery path can
achieve better gain.
– If yes, which are these nodes to cache and how can we
identify them?
3
“Cache All” vs “Random” Strategies
• Ubiquitous caching (NNC+LRU): caches every content in every
node along the delivery path and uses LRU eviction strategy
• Random caching strategy (Rdm+LRU): caches at one randomly
selected node along the delivery path and also uses LRU eviction
4
0 50 100 150 200
0.49
0.5
0.51
0.52
0.53
0.54
0.55
0.56
0.57
Time, t(s)
InstantaneousHopReductionRatio,β(t)
NNC+LRU
Rdm+LRU
0 50 100 150 200
0.42
0.44
0.46
0.48
0.5
0.52
0.54
0.56
0.58
Time, t(s)
InstantaneousServerHitReductionRatio,γ(t)
NNC+LRU
Rdm+LRU
Simple random caching outperforming ubiquitous caching in the number of hops to hit the
content (left) and reduced server hits (right).
Approach & Rationale
• The approach: to cache content only in selected node(s) for each
content request
• The rationale: some nodes have higher probability of getting a
cache hit than others.
– By strategically caching the content at “better” node(s), we can
decrease the cache eviction rate and increase the cache hit.
– Illustrative example:
5
– Events: t=0, client A requests a content from S1 and t=1, client B
requests a content from S1
– If NNC, ubiquitous caching at v1, v2, v3 and v4 but only v3 necessary
for the request from client B
– v3 being the “important” node in this case.
v2
v6
v5v1 v3s1
Client C
Client B
v4 Client A
(Ego Network) Betweenness Centrality
6
• The betweenness centrality (Betw+LRU): measures the number
of times a specific node lies on the content delivery path between
all pairs of nodes in a network topology.
– The basic idea is that if a node lies along a high number of content
delivery paths, then it is more likely to get a cache hit.
– Caching only at those “important” nodes reduces the cache
replacement rate while still caching content where a cache hit is most
probable to happen.
• The Ego Network Betweenness centrality (EgoBetw-LRU):
– The ego network consists of a node together with all its immediate
neighbours and all the links among those nodes.
– The idea is for each node, v to compute its CB(v) based on its ego
network rather than the entire network topology.
Operation
• Betw+LRU and EgoBetw+LRU caching:
– Operates at per request level.
– The CB value is pre-computed offline and configured to every
router by the network management system.
– The content request message records the highest centrality
value among all the intermediate nodes.
– This value is copied onto the content messages.
– On the way to the requesting user, each router matches its own
CB against the attached one
• The content is cached only if the two values match.
• If more nodes have the same highest centrality value, all of them
will cache the content.
7
Features
• Betw+LRU and EgoBetw+LRU:
– cache content at nodes which have high probability of
getting cache hits
– both approaches always spread content towards users
• If a content is popular at a specific region of the Internet, then this
content will eventually be cached in that region
– is lightweight - each node independently makes its caching
decision solely based on its own CB
• neither requiring information exchange with other nodes nor
inference of server location or of traffic patterns.
8
Metrics
9
• In-network caching aims to:
1. Reduce the content delivery latency whereby a cached content near
the client can be fetched faster than from the server
2. Reduce traffic and congestion since content traverses fewer links
when there is a cache hit
3. Alleviate server load as every cache hit means serving one less
request.
– where Hr(t) = the hop count from client to server requesting fr from
time t-1 to t and hr(t) = the hop count from the content client to the
first node where a cache hit occurs for fr from t-1 to t.
– where Wr(t) = the number of request for fr from t-1 to t and wr(t) = the
number of server hits for fr from t-1 to t.
Performance Evaluation on k-ary Trees
• Instantaneous performance for a 5-level binary tree (k=2,
D=4)
0 50 100 150 200
0.38
0.4
0.42
0.44
0.46
0.48
0.5
Time, t(s)
InstantaneousHopReductionRatio,β(t)
NNC+LRU Betw+LRU EgoBetw+LRU Rdm+LRU
0 20 40 60 80 100 120 140 160 180 200
0.18
0.2
0.22
0.24
0.26
0.28
0.3
0.32
0.34
0.36
Time, t(s)
InstantaneousServerHitReductionRatio,γ(t)
NNC+LRU Betw+LRU EgoBetw+LRU Rdm+LRU
Instantaneous behavior of the caching schemes for a binary tree; (left) β, (right) γ.
10
Performance Evaluation on k-ary Trees
• k-ary trees with varying k and D.
4 5 6
0.35
0.4
0.45
0.5
0.55
Binary tree depth, D
HopReductionRatio,β
NNC+LRU
Betw+LRU
EgoBetw+LRU
Rdm+LRU
2 3 4 5
0.32
0.34
0.36
0.38
0.4
0.42
0.44
0.46
0.48
0.5
Spread factor, k
HopReductionRatio,β
NNC+LRU
Betw+LRU
EgoBetw+LRU
Rdm+LRU
Betw+LRU consistently outperforms the rest over different D (left) and k (right).11
Performance Evaluation on Scale-free Graphs
• Scale-free graphs
– Barabasi-Albert (BA) graphs preferential attachment
– N = 100 and mean valence = 2
0 50 100 150 200
0.36
0.38
0.4
0.42
0.44
0.46
0.48
0.5
Time, t(s)
InstantaneousHopReductionRatio,β(t)
NNC+LRU
Betw+LRU
EgoBetw+LRU
Rdm+LRU
0 50 100 150 200
0.16
0.18
0.2
0.22
0.24
0.26
0.28
0.3
0.32
0.34
0.36
Time, t(s)
InstantaneousServerHitReductionRatio,γ(t)
NNC+LRU
Betw+LRU
EgoBetw+LRU
Rdm+LRU
Instantaneous behavior of the caching schemes in a B-A graph; (left) β, (right) γ.
12
Performance Evaluation on Scale-free Graphs
• 10 generations of B-A graphs with N = 100 and
mean valence = 2.
1 2 3 4 5 6 7 8 9 10
0.38
0.4
0.42
0.44
0.46
0.48
0.5
0.52
Graph ID
HopReductionRatio,β
NNC+LRU
Betw+LRU
EgoBetw+LRU
Rdm+LRU
0 20 40 60 80 100
0
0.2
0.4
0.6
0.8
1
1.2
1.4
Betweenness
0 20 40 60 80 100
0
5
10
15
20
25
30
35
EgoNetworkBetweenness
Node ID
Betweenness
Ego Network Betweenness
Caching performance with different 100-node B-A graphs (left) and a sample ego network
betweenness and betweenness values of the nodes in a B-A graph (right).
13
Evaluation on Real Internet Topology
• Real-world Internet topology
– Large domain-level topology extracted from the CAIDA dataset
– Root at tier-1 ISP (AS7018)
– 6,804 domains and 10,205 links
Instantaneous behavior of the caching schemes in a large-scale real Internet topology; (left) β,
(right) γ. 14
0 20 40 60 80 100
0.5
0.55
0.6
0.65
0.7
0.75
Time, t (s)
InstantaneousHopReductionRatio,β(t)
NNC+LRU
Betw+LRU
EgoBetw+LRU
Random+LRU
0 20 40 60 80 100
0.2
0.25
0.3
0.35
0.4
0.45
0.5
0.55
Time, t (s)
InstantaneousServerHitReductionRatio,γ(t)
NNC+LRU
Betw+LRU
EgoBetw+LRU
Rdm+LRU
Summary and Conclusions
• We argue against the necessity of a ubiquitous caching
strategy in ICN and investigate the possibility of caching less to
achieve higher performance gain.
• We demonstrate that even a simple random caching strategy
(Rdm+LRU) can outperform (though inconsistently) the current
pervasive caching paradigm under the conditions
– that the network topology has low number of distinct delivery paths
– high average delivery path length.
• We propose a caching strategy based on the concept of
betweenness centrality (Betw+LRU)
– content is only cached at the nodes having the highest probability of
getting a cache hit along the content delivery path.
– also proposed an approximation of it (EgoBetw+LRU) for scalable and
distributed realization in dynamic network environments.
15
Summary and Conclusions (cont’d)
• We compare the performance of our proposals against the
ubiquitous caching of the NNC proposal (NNC+LRU).
• Observations:
– Betw+LRU consistently achieves the best hop and server
reduction ratios across topologies having different structural
properties without being restricted by the operating conditions
required by Rdm+LRU.
– EgoBetw+LRU approximates closely Betw+LRU in non-regular
topologies (e.g., B-A graphs, real Internet topology)
• a practical candidate for the deployment of this approach.
– Besides synthetic topologies (i.e., k-ary trees and B-A graphs), the
observations are further verified with a large-scale real Internet
topology.
• We conclude that indeed caching less can achieve more and
our proposed (Ego)Betw+LRU is a candidate for realizing this
promise. 16
• Work done in the context of the EU FP7 project COMET which we lead
technically - http://www.comet-project.org/
• W. K. Chai, I. Psaras, G. Pavlou, et. al., “CURLING: Content-
ubiquitous Resolution and Delivery Infrastructure for Next-generation
Services,” IEEE Commun. Mag., vol. 49, no. 3, pp. 112-120, 2011.
• I. Psaras, R. Clegg, R. Landa, W. K. Chai and G. Pavlou, “Modelling
and Evaluation of CCN-caching Trees,” Proc. of IFIP Networking,
Valencia, Spain, May 2011.
• I. Psaras, W. K. Chai and G. Pavlou, “To Cache or Not To Cache:
Probabilistic In-Network Caching for Information-Centric Networks,” to
appear in the ACM SIGCOMM ICN Workshop, August 2012.
17
Related Publications

More Related Content

What's hot

computer-memory
computer-memorycomputer-memory
computer-memory
Bablu Shofi
 
Network Algorithmics
Network AlgorithmicsNetwork Algorithmics
Network Algorithmics
인욱 황
 
kubernetes를 부탁해~ Prometheus 기반 Monitoring 구축&활용기
kubernetes를 부탁해~ Prometheus 기반 Monitoring 구축&활용기kubernetes를 부탁해~ Prometheus 기반 Monitoring 구축&활용기
kubernetes를 부탁해~ Prometheus 기반 Monitoring 구축&활용기
Jinsu Moon
 
Private Range Query by Perturbation and Matrix Based Encryption
Private Range Query by Perturbation and Matrix Based EncryptionPrivate Range Query by Perturbation and Matrix Based Encryption
Private Range Query by Perturbation and Matrix Based EncryptionJunpei Kawamoto
 
Realtime Analytics with Storm and Hadoop
Realtime Analytics with Storm and HadoopRealtime Analytics with Storm and Hadoop
Realtime Analytics with Storm and HadoopDataWorks Summit
 
Introduction to Storm
Introduction to Storm Introduction to Storm
Introduction to Storm Chandler Huang
 
RL-Cache: Learning-Based Cache Admission for Content Delivery
RL-Cache: Learning-Based Cache Admission for Content DeliveryRL-Cache: Learning-Based Cache Admission for Content Delivery
RL-Cache: Learning-Based Cache Admission for Content Delivery
Förderverein Technische Fakultät
 
DBodle QoS Exam Study Notes
DBodle QoS Exam Study NotesDBodle QoS Exam Study Notes
DBodle QoS Exam Study Notes
Duane Bodle
 
GC Tuning in the HotSpot Java VM - a FISL 10 Presentation
GC Tuning in the HotSpot Java VM - a FISL 10 PresentationGC Tuning in the HotSpot Java VM - a FISL 10 Presentation
GC Tuning in the HotSpot Java VM - a FISL 10 PresentationLudovic Poitou
 
Kafka overview v0.1
Kafka overview v0.1Kafka overview v0.1
Kafka overview v0.1
Mahendran Ponnusamy
 
Enhancing proxy based web caching system using clustering based pre fetching ...
Enhancing proxy based web caching system using clustering based pre fetching ...Enhancing proxy based web caching system using clustering based pre fetching ...
Enhancing proxy based web caching system using clustering based pre fetching ...
eSAT Publishing House
 
mqtt intro short
mqtt intro shortmqtt intro short
mqtt intro short
MahmutERKEN
 
Available network bandwidth schema to improve performance in tcp protocols
Available network bandwidth schema to improve performance in tcp protocolsAvailable network bandwidth schema to improve performance in tcp protocols
Available network bandwidth schema to improve performance in tcp protocols
IJCNCJournal
 
NYC Hadoop Meetup - MapR, Architecture, Philosophy and Applications
NYC Hadoop Meetup - MapR, Architecture, Philosophy and ApplicationsNYC Hadoop Meetup - MapR, Architecture, Philosophy and Applications
NYC Hadoop Meetup - MapR, Architecture, Philosophy and Applications
Jason Shao
 
Real-time Big Data Processing with Storm
Real-time Big Data Processing with StormReal-time Big Data Processing with Storm
Real-time Big Data Processing with Storm
viirya
 
Stress your DUT
Stress your DUTStress your DUT
Stress your DUT
Redge Technologies
 
Storm 2012-03-29
Storm 2012-03-29Storm 2012-03-29
Storm 2012-03-29
Ted Dunning
 
Talk About Apache Cassandra
Talk About Apache CassandraTalk About Apache Cassandra
Talk About Apache Cassandra
Jacky Chu
 
Introduce Apache Cassandra - JavaTwo Taiwan, 2012
Introduce Apache Cassandra - JavaTwo Taiwan, 2012Introduce Apache Cassandra - JavaTwo Taiwan, 2012
Introduce Apache Cassandra - JavaTwo Taiwan, 2012Boris Yen
 

What's hot (20)

computer-memory
computer-memorycomputer-memory
computer-memory
 
Network Algorithmics
Network AlgorithmicsNetwork Algorithmics
Network Algorithmics
 
kubernetes를 부탁해~ Prometheus 기반 Monitoring 구축&활용기
kubernetes를 부탁해~ Prometheus 기반 Monitoring 구축&활용기kubernetes를 부탁해~ Prometheus 기반 Monitoring 구축&활용기
kubernetes를 부탁해~ Prometheus 기반 Monitoring 구축&활용기
 
Schedulling
SchedullingSchedulling
Schedulling
 
Private Range Query by Perturbation and Matrix Based Encryption
Private Range Query by Perturbation and Matrix Based EncryptionPrivate Range Query by Perturbation and Matrix Based Encryption
Private Range Query by Perturbation and Matrix Based Encryption
 
Realtime Analytics with Storm and Hadoop
Realtime Analytics with Storm and HadoopRealtime Analytics with Storm and Hadoop
Realtime Analytics with Storm and Hadoop
 
Introduction to Storm
Introduction to Storm Introduction to Storm
Introduction to Storm
 
RL-Cache: Learning-Based Cache Admission for Content Delivery
RL-Cache: Learning-Based Cache Admission for Content DeliveryRL-Cache: Learning-Based Cache Admission for Content Delivery
RL-Cache: Learning-Based Cache Admission for Content Delivery
 
DBodle QoS Exam Study Notes
DBodle QoS Exam Study NotesDBodle QoS Exam Study Notes
DBodle QoS Exam Study Notes
 
GC Tuning in the HotSpot Java VM - a FISL 10 Presentation
GC Tuning in the HotSpot Java VM - a FISL 10 PresentationGC Tuning in the HotSpot Java VM - a FISL 10 Presentation
GC Tuning in the HotSpot Java VM - a FISL 10 Presentation
 
Kafka overview v0.1
Kafka overview v0.1Kafka overview v0.1
Kafka overview v0.1
 
Enhancing proxy based web caching system using clustering based pre fetching ...
Enhancing proxy based web caching system using clustering based pre fetching ...Enhancing proxy based web caching system using clustering based pre fetching ...
Enhancing proxy based web caching system using clustering based pre fetching ...
 
mqtt intro short
mqtt intro shortmqtt intro short
mqtt intro short
 
Available network bandwidth schema to improve performance in tcp protocols
Available network bandwidth schema to improve performance in tcp protocolsAvailable network bandwidth schema to improve performance in tcp protocols
Available network bandwidth schema to improve performance in tcp protocols
 
NYC Hadoop Meetup - MapR, Architecture, Philosophy and Applications
NYC Hadoop Meetup - MapR, Architecture, Philosophy and ApplicationsNYC Hadoop Meetup - MapR, Architecture, Philosophy and Applications
NYC Hadoop Meetup - MapR, Architecture, Philosophy and Applications
 
Real-time Big Data Processing with Storm
Real-time Big Data Processing with StormReal-time Big Data Processing with Storm
Real-time Big Data Processing with Storm
 
Stress your DUT
Stress your DUTStress your DUT
Stress your DUT
 
Storm 2012-03-29
Storm 2012-03-29Storm 2012-03-29
Storm 2012-03-29
 
Talk About Apache Cassandra
Talk About Apache CassandraTalk About Apache Cassandra
Talk About Apache Cassandra
 
Introduce Apache Cassandra - JavaTwo Taiwan, 2012
Introduce Apache Cassandra - JavaTwo Taiwan, 2012Introduce Apache Cassandra - JavaTwo Taiwan, 2012
Introduce Apache Cassandra - JavaTwo Taiwan, 2012
 

Similar to Cache "Less for More" in Information-centric Networks (CL4M)

Dcim distributed cache invalidation method for maintaining cache consistency ...
Dcim distributed cache invalidation method for maintaining cache consistency ...Dcim distributed cache invalidation method for maintaining cache consistency ...
Dcim distributed cache invalidation method for maintaining cache consistency ...
JPINFOTECH JAYAPRAKASH
 
Dcim distributed cache invalidation method for maintaining cache consistency ...
Dcim distributed cache invalidation method for maintaining cache consistency ...Dcim distributed cache invalidation method for maintaining cache consistency ...
Dcim distributed cache invalidation method for maintaining cache consistency ...
JPINFOTECH JAYAPRAKASH
 
JAVA 2013 IEEE MOBILECOMPUTING PROJECT DCIM: distributed cache invalidation m...
JAVA 2013 IEEE MOBILECOMPUTING PROJECT DCIM: distributed cache invalidation m...JAVA 2013 IEEE MOBILECOMPUTING PROJECT DCIM: distributed cache invalidation m...
JAVA 2013 IEEE MOBILECOMPUTING PROJECT DCIM: distributed cache invalidation m...
IEEEGLOBALSOFTTECHNOLOGIES
 
Dcim distributed cache invalidation method for maintaining cache consistency ...
Dcim distributed cache invalidation method for maintaining cache consistency ...Dcim distributed cache invalidation method for maintaining cache consistency ...
Dcim distributed cache invalidation method for maintaining cache consistency ...
IEEEFINALYEARPROJECTS
 
7. Key-Value Databases: In Depth
7. Key-Value Databases: In Depth7. Key-Value Databases: In Depth
7. Key-Value Databases: In Depth
Fabio Fumarola
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Dcim distributed cache invalidation ...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Dcim distributed cache invalidation ...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Dcim distributed cache invalidation ...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Dcim distributed cache invalidation ...
IEEEGLOBALSOFTTECHNOLOGIES
 
PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System
PACK: Prediction-Based Cloud Bandwidth and Cost Reduction SystemPACK: Prediction-Based Cloud Bandwidth and Cost Reduction System
PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System
JPINFOTECH JAYAPRAKASH
 
Age-based Cooperative Caching in Information-Centric Networks
Age-based Cooperative Caching in Information-Centric NetworksAge-based Cooperative Caching in Information-Centric Networks
Age-based Cooperative Caching in Information-Centric Networks
Shi Junxiao
 
A Two-Tiered On-Line Server-Side Bandwidth Reservation Framework for the Real...
A Two-Tiered On-Line Server-Side Bandwidth Reservation Framework for the Real...A Two-Tiered On-Line Server-Side Bandwidth Reservation Framework for the Real...
A Two-Tiered On-Line Server-Side Bandwidth Reservation Framework for the Real...white paper
 
Limitations of memory system performance
Limitations of memory system performanceLimitations of memory system performance
Limitations of memory system performance
Syed Zaid Irshad
 
Kubernetes @ Squarespace (SRE Portland Meetup October 2017)
Kubernetes @ Squarespace (SRE Portland Meetup October 2017)Kubernetes @ Squarespace (SRE Portland Meetup October 2017)
Kubernetes @ Squarespace (SRE Portland Meetup October 2017)
Kevin Lynch
 
Optimized placement in Openstack for NFV
Optimized placement in Openstack for NFVOptimized placement in Openstack for NFV
Optimized placement in Openstack for NFV
Debojyoti Dutta
 
Neutron qos overview
Neutron qos overviewNeutron qos overview
Neutron qos overview
Sławomir Kapłoński
 
[EUC2016] DockerCap: a software-level power capping orchestrator for Docker c...
[EUC2016] DockerCap: a software-level power capping orchestrator for Docker c...[EUC2016] DockerCap: a software-level power capping orchestrator for Docker c...
[EUC2016] DockerCap: a software-level power capping orchestrator for Docker c...
Matteo Ferroni
 
Cc
CcCc
Cosmos DB at VLDB 2019
Cosmos DB at VLDB 2019Cosmos DB at VLDB 2019
Cosmos DB at VLDB 2019
Dharma Shukla
 
iDASH
iDASH iDASH
Ieeepro techno solutions 2014 ieee java project - cloud bandwidth and cost ...
Ieeepro techno solutions   2014 ieee java project - cloud bandwidth and cost ...Ieeepro techno solutions   2014 ieee java project - cloud bandwidth and cost ...
Ieeepro techno solutions 2014 ieee java project - cloud bandwidth and cost ...
hemanthbbc
 
Ieeepro techno solutions 2014 ieee dotnet project - cloud bandwidth and cos...
Ieeepro techno solutions   2014 ieee dotnet project - cloud bandwidth and cos...Ieeepro techno solutions   2014 ieee dotnet project - cloud bandwidth and cos...
Ieeepro techno solutions 2014 ieee dotnet project - cloud bandwidth and cos...
ASAITHAMBIRAJAA
 

Similar to Cache "Less for More" in Information-centric Networks (CL4M) (20)

Dcim distributed cache invalidation method for maintaining cache consistency ...
Dcim distributed cache invalidation method for maintaining cache consistency ...Dcim distributed cache invalidation method for maintaining cache consistency ...
Dcim distributed cache invalidation method for maintaining cache consistency ...
 
Dcim distributed cache invalidation method for maintaining cache consistency ...
Dcim distributed cache invalidation method for maintaining cache consistency ...Dcim distributed cache invalidation method for maintaining cache consistency ...
Dcim distributed cache invalidation method for maintaining cache consistency ...
 
JAVA 2013 IEEE MOBILECOMPUTING PROJECT DCIM: distributed cache invalidation m...
JAVA 2013 IEEE MOBILECOMPUTING PROJECT DCIM: distributed cache invalidation m...JAVA 2013 IEEE MOBILECOMPUTING PROJECT DCIM: distributed cache invalidation m...
JAVA 2013 IEEE MOBILECOMPUTING PROJECT DCIM: distributed cache invalidation m...
 
Dcim distributed cache invalidation method for maintaining cache consistency ...
Dcim distributed cache invalidation method for maintaining cache consistency ...Dcim distributed cache invalidation method for maintaining cache consistency ...
Dcim distributed cache invalidation method for maintaining cache consistency ...
 
7. Key-Value Databases: In Depth
7. Key-Value Databases: In Depth7. Key-Value Databases: In Depth
7. Key-Value Databases: In Depth
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Dcim distributed cache invalidation ...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Dcim distributed cache invalidation ...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Dcim distributed cache invalidation ...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Dcim distributed cache invalidation ...
 
PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System
PACK: Prediction-Based Cloud Bandwidth and Cost Reduction SystemPACK: Prediction-Based Cloud Bandwidth and Cost Reduction System
PACK: Prediction-Based Cloud Bandwidth and Cost Reduction System
 
slides
slidesslides
slides
 
Age-based Cooperative Caching in Information-Centric Networks
Age-based Cooperative Caching in Information-Centric NetworksAge-based Cooperative Caching in Information-Centric Networks
Age-based Cooperative Caching in Information-Centric Networks
 
A Two-Tiered On-Line Server-Side Bandwidth Reservation Framework for the Real...
A Two-Tiered On-Line Server-Side Bandwidth Reservation Framework for the Real...A Two-Tiered On-Line Server-Side Bandwidth Reservation Framework for the Real...
A Two-Tiered On-Line Server-Side Bandwidth Reservation Framework for the Real...
 
Limitations of memory system performance
Limitations of memory system performanceLimitations of memory system performance
Limitations of memory system performance
 
Kubernetes @ Squarespace (SRE Portland Meetup October 2017)
Kubernetes @ Squarespace (SRE Portland Meetup October 2017)Kubernetes @ Squarespace (SRE Portland Meetup October 2017)
Kubernetes @ Squarespace (SRE Portland Meetup October 2017)
 
Optimized placement in Openstack for NFV
Optimized placement in Openstack for NFVOptimized placement in Openstack for NFV
Optimized placement in Openstack for NFV
 
Neutron qos overview
Neutron qos overviewNeutron qos overview
Neutron qos overview
 
[EUC2016] DockerCap: a software-level power capping orchestrator for Docker c...
[EUC2016] DockerCap: a software-level power capping orchestrator for Docker c...[EUC2016] DockerCap: a software-level power capping orchestrator for Docker c...
[EUC2016] DockerCap: a software-level power capping orchestrator for Docker c...
 
Cc
CcCc
Cc
 
Cosmos DB at VLDB 2019
Cosmos DB at VLDB 2019Cosmos DB at VLDB 2019
Cosmos DB at VLDB 2019
 
iDASH
iDASH iDASH
iDASH
 
Ieeepro techno solutions 2014 ieee java project - cloud bandwidth and cost ...
Ieeepro techno solutions   2014 ieee java project - cloud bandwidth and cost ...Ieeepro techno solutions   2014 ieee java project - cloud bandwidth and cost ...
Ieeepro techno solutions 2014 ieee java project - cloud bandwidth and cost ...
 
Ieeepro techno solutions 2014 ieee dotnet project - cloud bandwidth and cos...
Ieeepro techno solutions   2014 ieee dotnet project - cloud bandwidth and cos...Ieeepro techno solutions   2014 ieee dotnet project - cloud bandwidth and cos...
Ieeepro techno solutions 2014 ieee dotnet project - cloud bandwidth and cos...
 

Recently uploaded

Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
Jen Stirrup
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
UiPathCommunity
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Enhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZEnhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZ
Globus
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 

Recently uploaded (20)

Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..UiPath Community Day Dubai: AI at Work..
UiPath Community Day Dubai: AI at Work..
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Enhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZEnhancing Performance with Globus and the Science DMZ
Enhancing Performance with Globus and the Science DMZ
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 

Cache "Less for More" in Information-centric Networks (CL4M)

  • 1. Cache “Less for More” in Information- Centric Networks W. K. Chai, D. He, I. Psaras and G. Pavlou (presenter) Department of Electronic & Electrical Engineering University College London London WC1E 6EA United Kingdom
  • 2. Background: Caching in Information-Centric Networking (ICN) • In Information-Centric Networking (ICN), contents are named. • Content requests can be served from any node having the content identified by the content name. • ICN features ubiquitous in-network caching: – potentially every router caching indiscriminately all content fragments that traverse it – if a matching request is received while a fragment is still in its cache store, it will be forwarded to the requester from that element, avoiding going to the hosting server. • Specifically, NNC* proposes: – A router caches every content chunk that traverses it with the assumption that routers are equipped with (large) cache stores. – A least recently used (LRU) cache eviction policy is used. 2*V. Jacobson, et al., “Networking Named Content,” Proc. ACM CoNEXT, 2009, pp. 1-12.
  • 3. Argument & Objective • The Argument: indiscriminate universal caching strategy is unnecessarily costly and sub-optimal – High content replacement frequency may result in content being replaced before getting a hit. • The Objective: to study alternative in-network caching strategies for enhancing the overall content delivery performance. – We address the central question of whether caching only at specific sub-set of node(s) en route the delivery path can achieve better gain. – If yes, which are these nodes to cache and how can we identify them? 3
  • 4. “Cache All” vs “Random” Strategies • Ubiquitous caching (NNC+LRU): caches every content in every node along the delivery path and uses LRU eviction strategy • Random caching strategy (Rdm+LRU): caches at one randomly selected node along the delivery path and also uses LRU eviction 4 0 50 100 150 200 0.49 0.5 0.51 0.52 0.53 0.54 0.55 0.56 0.57 Time, t(s) InstantaneousHopReductionRatio,β(t) NNC+LRU Rdm+LRU 0 50 100 150 200 0.42 0.44 0.46 0.48 0.5 0.52 0.54 0.56 0.58 Time, t(s) InstantaneousServerHitReductionRatio,γ(t) NNC+LRU Rdm+LRU Simple random caching outperforming ubiquitous caching in the number of hops to hit the content (left) and reduced server hits (right).
  • 5. Approach & Rationale • The approach: to cache content only in selected node(s) for each content request • The rationale: some nodes have higher probability of getting a cache hit than others. – By strategically caching the content at “better” node(s), we can decrease the cache eviction rate and increase the cache hit. – Illustrative example: 5 – Events: t=0, client A requests a content from S1 and t=1, client B requests a content from S1 – If NNC, ubiquitous caching at v1, v2, v3 and v4 but only v3 necessary for the request from client B – v3 being the “important” node in this case. v2 v6 v5v1 v3s1 Client C Client B v4 Client A
  • 6. (Ego Network) Betweenness Centrality 6 • The betweenness centrality (Betw+LRU): measures the number of times a specific node lies on the content delivery path between all pairs of nodes in a network topology. – The basic idea is that if a node lies along a high number of content delivery paths, then it is more likely to get a cache hit. – Caching only at those “important” nodes reduces the cache replacement rate while still caching content where a cache hit is most probable to happen. • The Ego Network Betweenness centrality (EgoBetw-LRU): – The ego network consists of a node together with all its immediate neighbours and all the links among those nodes. – The idea is for each node, v to compute its CB(v) based on its ego network rather than the entire network topology.
  • 7. Operation • Betw+LRU and EgoBetw+LRU caching: – Operates at per request level. – The CB value is pre-computed offline and configured to every router by the network management system. – The content request message records the highest centrality value among all the intermediate nodes. – This value is copied onto the content messages. – On the way to the requesting user, each router matches its own CB against the attached one • The content is cached only if the two values match. • If more nodes have the same highest centrality value, all of them will cache the content. 7
  • 8. Features • Betw+LRU and EgoBetw+LRU: – cache content at nodes which have high probability of getting cache hits – both approaches always spread content towards users • If a content is popular at a specific region of the Internet, then this content will eventually be cached in that region – is lightweight - each node independently makes its caching decision solely based on its own CB • neither requiring information exchange with other nodes nor inference of server location or of traffic patterns. 8
  • 9. Metrics 9 • In-network caching aims to: 1. Reduce the content delivery latency whereby a cached content near the client can be fetched faster than from the server 2. Reduce traffic and congestion since content traverses fewer links when there is a cache hit 3. Alleviate server load as every cache hit means serving one less request. – where Hr(t) = the hop count from client to server requesting fr from time t-1 to t and hr(t) = the hop count from the content client to the first node where a cache hit occurs for fr from t-1 to t. – where Wr(t) = the number of request for fr from t-1 to t and wr(t) = the number of server hits for fr from t-1 to t.
  • 10. Performance Evaluation on k-ary Trees • Instantaneous performance for a 5-level binary tree (k=2, D=4) 0 50 100 150 200 0.38 0.4 0.42 0.44 0.46 0.48 0.5 Time, t(s) InstantaneousHopReductionRatio,β(t) NNC+LRU Betw+LRU EgoBetw+LRU Rdm+LRU 0 20 40 60 80 100 120 140 160 180 200 0.18 0.2 0.22 0.24 0.26 0.28 0.3 0.32 0.34 0.36 Time, t(s) InstantaneousServerHitReductionRatio,γ(t) NNC+LRU Betw+LRU EgoBetw+LRU Rdm+LRU Instantaneous behavior of the caching schemes for a binary tree; (left) β, (right) γ. 10
  • 11. Performance Evaluation on k-ary Trees • k-ary trees with varying k and D. 4 5 6 0.35 0.4 0.45 0.5 0.55 Binary tree depth, D HopReductionRatio,β NNC+LRU Betw+LRU EgoBetw+LRU Rdm+LRU 2 3 4 5 0.32 0.34 0.36 0.38 0.4 0.42 0.44 0.46 0.48 0.5 Spread factor, k HopReductionRatio,β NNC+LRU Betw+LRU EgoBetw+LRU Rdm+LRU Betw+LRU consistently outperforms the rest over different D (left) and k (right).11
  • 12. Performance Evaluation on Scale-free Graphs • Scale-free graphs – Barabasi-Albert (BA) graphs preferential attachment – N = 100 and mean valence = 2 0 50 100 150 200 0.36 0.38 0.4 0.42 0.44 0.46 0.48 0.5 Time, t(s) InstantaneousHopReductionRatio,β(t) NNC+LRU Betw+LRU EgoBetw+LRU Rdm+LRU 0 50 100 150 200 0.16 0.18 0.2 0.22 0.24 0.26 0.28 0.3 0.32 0.34 0.36 Time, t(s) InstantaneousServerHitReductionRatio,γ(t) NNC+LRU Betw+LRU EgoBetw+LRU Rdm+LRU Instantaneous behavior of the caching schemes in a B-A graph; (left) β, (right) γ. 12
  • 13. Performance Evaluation on Scale-free Graphs • 10 generations of B-A graphs with N = 100 and mean valence = 2. 1 2 3 4 5 6 7 8 9 10 0.38 0.4 0.42 0.44 0.46 0.48 0.5 0.52 Graph ID HopReductionRatio,β NNC+LRU Betw+LRU EgoBetw+LRU Rdm+LRU 0 20 40 60 80 100 0 0.2 0.4 0.6 0.8 1 1.2 1.4 Betweenness 0 20 40 60 80 100 0 5 10 15 20 25 30 35 EgoNetworkBetweenness Node ID Betweenness Ego Network Betweenness Caching performance with different 100-node B-A graphs (left) and a sample ego network betweenness and betweenness values of the nodes in a B-A graph (right). 13
  • 14. Evaluation on Real Internet Topology • Real-world Internet topology – Large domain-level topology extracted from the CAIDA dataset – Root at tier-1 ISP (AS7018) – 6,804 domains and 10,205 links Instantaneous behavior of the caching schemes in a large-scale real Internet topology; (left) β, (right) γ. 14 0 20 40 60 80 100 0.5 0.55 0.6 0.65 0.7 0.75 Time, t (s) InstantaneousHopReductionRatio,β(t) NNC+LRU Betw+LRU EgoBetw+LRU Random+LRU 0 20 40 60 80 100 0.2 0.25 0.3 0.35 0.4 0.45 0.5 0.55 Time, t (s) InstantaneousServerHitReductionRatio,γ(t) NNC+LRU Betw+LRU EgoBetw+LRU Rdm+LRU
  • 15. Summary and Conclusions • We argue against the necessity of a ubiquitous caching strategy in ICN and investigate the possibility of caching less to achieve higher performance gain. • We demonstrate that even a simple random caching strategy (Rdm+LRU) can outperform (though inconsistently) the current pervasive caching paradigm under the conditions – that the network topology has low number of distinct delivery paths – high average delivery path length. • We propose a caching strategy based on the concept of betweenness centrality (Betw+LRU) – content is only cached at the nodes having the highest probability of getting a cache hit along the content delivery path. – also proposed an approximation of it (EgoBetw+LRU) for scalable and distributed realization in dynamic network environments. 15
  • 16. Summary and Conclusions (cont’d) • We compare the performance of our proposals against the ubiquitous caching of the NNC proposal (NNC+LRU). • Observations: – Betw+LRU consistently achieves the best hop and server reduction ratios across topologies having different structural properties without being restricted by the operating conditions required by Rdm+LRU. – EgoBetw+LRU approximates closely Betw+LRU in non-regular topologies (e.g., B-A graphs, real Internet topology) • a practical candidate for the deployment of this approach. – Besides synthetic topologies (i.e., k-ary trees and B-A graphs), the observations are further verified with a large-scale real Internet topology. • We conclude that indeed caching less can achieve more and our proposed (Ego)Betw+LRU is a candidate for realizing this promise. 16
  • 17. • Work done in the context of the EU FP7 project COMET which we lead technically - http://www.comet-project.org/ • W. K. Chai, I. Psaras, G. Pavlou, et. al., “CURLING: Content- ubiquitous Resolution and Delivery Infrastructure for Next-generation Services,” IEEE Commun. Mag., vol. 49, no. 3, pp. 112-120, 2011. • I. Psaras, R. Clegg, R. Landa, W. K. Chai and G. Pavlou, “Modelling and Evaluation of CCN-caching Trees,” Proc. of IFIP Networking, Valencia, Spain, May 2011. • I. Psaras, W. K. Chai and G. Pavlou, “To Cache or Not To Cache: Probabilistic In-Network Caching for Information-Centric Networks,” to appear in the ACM SIGCOMM ICN Workshop, August 2012. 17 Related Publications