4.6 Article

An Improved Method to Deploy Cache Servers in Software Defined Network-based Information Centric Networking for Big Data

期刊

JOURNAL OF GRID COMPUTING
卷 17, 期 2, 页码 255-277

出版社

SPRINGER
DOI: 10.1007/s10723-019-09477-z

关键词

Big data; Centralized cache; Software defined networking; Information centric networking; Path-stretch; Closeness; Betweenness

向作者/读者索取更多资源

Big data involves a large amount of data generation, storage, transfer from one place to another, and analysis to extract meaningful information. Information centric networking (ICN) is an infrastructure that transfers big data from one node to another node, and provides in-network caches. For software defined network-based ICN approach, a recently proposed centralized cache server architecture deploys single cache server based on path-stretch value. Despite the advantages of centralized cache in ICN, single cache server for a large network has scalability issue. Moreover, it only considers the path-stretch ratio for cache server deployment. Consequently, the traffic can not be reduced optimally. To resolve such issues, we propose to deploy multiple cache servers based on joint optimization of multiple parameters, namely: (i) closeness centrality; (ii) betweenness centrality; (iii) path-stretch values; and (iv) load balancing in the network. Our proposed approach first computes the locations and the number of cache servers based on the network topology information in an offline manner and the cache servers are placed at their corresponding locations in the network. Next, the controller installs flow rules at the switches such that the switches can forward the request for content to one of its nearest cache server. Upon reaching a content request, if the content request matches with the contents stored at the cache server, the content is delivered to the requesting node; otherwise, the request is forwarded to the controller. In the next step, controller computes the path such that the content provider first sends the content to the cache server. Finally, a copy of the content is forwarded to the requesting node. Simulation results confirmed that the proposed approach performs better in terms of traffic overhead and average end-to-end delay as compared to an existing state-of-the-art approach.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.6
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

Article Computer Science, Information Systems

SpoofCatch: A Client-Side Protection Tool Against Phishing Attacks

Wilayat Khan, Aakash Ahmad, Aamir Qamar, Muhammad Kamran, Muhammad Altaf

Summary: The article proposes a new anti-phishing solution that relies on the overall visual appearance of web pages to prevent phishing attacks. The authors developed a browser extension called SpoofCatch, which uses visual similarity comparison algorithms for identification and conducted large-scale experiments to validate its effectiveness.

IT PROFESSIONAL (2021)

Article Computer Science, Hardware & Architecture

Clustering-cum-Handover Management Scheme for improved Internet access in high-density mobile wireless environments

Anam Javaid, Asma Rafiq, Maaz Rehan, M. Mustafa Rafique, M. Kamran, Ehsan Ullah Munir

Summary: This paper proposes a novel mechanism for uninterrupted connectivity in high density mobile wireless environments, ensuring seamless handover and providing high network throughput and low end-to-end delay through clustering and handover management.

SUSTAINABLE COMPUTING-INFORMATICS & SYSTEMS (2021)

Article Computer Science, Hardware & Architecture

A Particle Swarm Optimization Based Deep Learning Model for Vehicle Classification

Adi Alhudhaif, Ammar Saeed, Talha Imran, Muhammad Kamran, Ahmed S. Alghamdi, Ahmed O. Aseeri, Shtwai Alsubai

Summary: This paper presents the application of image classification in the domain of vehicle classification, using pre-trained CNN model and particle swarm optimization algorithm for autonomous vehicle classification. Through empirical evaluations and statistical tests, the model demonstrates outstanding performance in terms of accuracy, training time, and speed prediction.

COMPUTER SYSTEMS SCIENCE AND ENGINEERING (2022)

Article Chemistry, Analytical

A Novel Fingerprinting Technique for Data Storing and Sharing through Clouds

Mehvish Fatima, Muhammad Wasif Nisar, Junaid Rashid, Jungeun Kim, Muhammad Kamran, Amir Hussain

Summary: The proposed digital fingerprinting technique in the cloud environment provides a robust and efficient solution for protecting numeric attributes in relational databases, addressing the need for digital privacy management.

SENSORS (2021)

Article Engineering, Multidisciplinary

ARTNet: Ai-Based Resource Allocation and Task Offloading in a Reconfigurable Internet of Vehicular Networks

Muhammad Ibrar, Aamir Akbar, Syed Rooh Ullah Jan, Mian Ahmad Jan, Lei Wang, Houbing Song, Nadir Shah

Summary: The convergence of Software-Defined Networking (SDN) and Internet of Vehicular (IoV) integrated with Fog Computing (FC), known as Software Defined Vehicular based FC (SDV-F), aims to efficiently control wireless networks and tackle various challenges. However, it lacks an effective approach to enable ultra-reliable and delay-sensitive applications with high vehicle mobility. In this paper, a new AI-based Vehicle-to-Everything (V2X) framework called ARTNet is proposed for resource distribution and optimized communication using the SDV-F architecture. Experimental results show that ARTNet can efficiently distribute fog layer tasks and minimize delay in a dynamic IoV environment.

IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING (2022)

Article Computer Science, Cybernetics

3-D-SIS: A 3-D-Social Identifier Structure for Collaborative Edge Computing Based Social IoT

Muhammad Ibrar, Lei Wang, Aamir Akbar, Mian Ahmad Jan, Nadir Shah, Shahbaz Akhtar Abid, Michael Segal

Summary: The social Internet of Things (SIoT) integrates the concepts of social networking and IoT into a collaborative edge computing (CEC) based architecture, addressing the social and spatial physical trade-off problem. The novel 3-D-social identifier structure (3-D-SIS) model minimizes end-to-end delay and communication cost to improve performance in social device-to-device (S-D2D) communication. Validation using real traces of social networks show that 3-D-SIS selects the best neighbor and enhances end-to-end delay and throughput.

IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS (2022)

Article Chemistry, Analytical

Software-Defined Networking: Categories, Analysis, and Future Directions

Mudassar Hussain, Nadir Shah, Rashid Amin, Sultan S. Alshamrani, Aziz Alotaibi, Syed Mohsan Raza

Summary: Software-defined networking (SDN) is an innovative network architecture that separates control and management from data plane, simplifying network manageability and programmability. This paper evaluates and compares several existing approaches in SDN implementation process, covering network testing, flow rule installation, network security, memory management, simulators and emulators, programming languages, and controller platforms. It also discusses the benefits and limitations of these approaches and provides future research guidelines.

SENSORS (2022)

Article Engineering, Civil

SeAC: SDN-Enabled Adaptive Clustering Technique for Social-Aware Internet of Vehicles

Aamir Akbar, Muhammad Ibrar, Mian Ahmad Jan, Lei Wang, Nadir Shah, Houbing Herbert Song

Summary: Since millions of smart vehicles in Internet-of-Vehicles (IoV) produce and relay data, creating social networks of vehicles in IoV is crucial for the future Intelligent Transportation System (ITS). However, the IoV architecture has been fragmented to meet the needs of different work domains. To address these problems, the concept of Social IoV (SIoV) was introduced. One of the challenges in SIoV is the rapid growth and depletion of social relations between vehicles due to the dynamic and unstable nature of IoV. Therefore, we propose an adaptive clustering technique called SeAC to improve the stability and efficiency of SIoV.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2023)

Article Engineering, Electrical & Electronic

Reliability-Aware Flow Distribution Algorithm in SDN-Enabled Fog Computing for Smart Cities

Muhammad Ibrar, Lei Wang, Nadir Shah, Ori Rottenstreich, Gabriel-Miro Muntean, Aamir Akbar

Summary: To improve the performance of communication infrastructure in smart cities, the integration of Fog Computing and Software-Defined Networking has been proposed. This integrated architecture meets the requirements of IoT applications in terms of manageability, scalability, reliability, and latency. This paper proposes reliability-aware flow distribution and optimization algorithms that distribute flows based on link reliability levels, minimizing the impact of link failure on time-critical flows in smart cities.

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2023)

Article Computer Science, Information Systems

RL-IoT: Reinforcement Learning-Based Routing Approach for Cognitive Radio-Enabled IoT Communications

Tauqeer Safdar Malik, Kaleem Razzaq Malik, Ayesha Afzal, Muhammad Ibrar, Lei Wang, Houbing Song, Nadir Shah

Summary: In this paper, we propose a reinforcement learning-based routing approach in the cognitive radio network-based Internet of Things (IoT) environment to achieve higher data rates and minimize end-to-end routing delays. Our evaluation results show that the proposed model outperforms existing approaches in terms of data rate, throughput, packet collision, and end-to-end delay.

IEEE INTERNET OF THINGS JOURNAL (2023)

Article Computer Science, Information Systems

Vehicle Classification Using Deep Feature Fusion and Genetic Algorithms

Ahmed S. Alghamdi, Ammar Saeed, Muhammad Kamran, Khalid T. Mursi, Wafa Sulaiman Almukadi

Summary: This paper proposes a hybrid model for vehicle classification, which integrates a pre-trained Convolutional Neural Network (CNN) and an evolutionary feature selection model. The model achieves accurate classification of eight different vehicle categories and outperforms other kernels and existing works in terms of performance.

ELECTRONICS (2023)

Article Chemistry, Multidisciplinary

Sensing and Device Neighborhood-Based Slot Assignment Approach for the Internet of Things

Mushtaq Khan, Rahim Khan, Nadir Shah, Abdullah Ghani, Samia Allaoua Chelloug, Wasif Nisar, Jason Teo

Summary: This paper presents a neighborhood-based smart slot allocation scheme for IoT networks, with a focus on mobile devices. The scheme resolves concurrent communication issues by maintaining two types of slots (dedicated and reserved) and assigning them to devices based on a FCFS basis. Simulation results show that the proposed scheme outperforms existing approaches in terms of lifetime, slot allocation, and slot waiting time.

APPLIED SCIENCES-BASEL (2023)

Article Engineering, Multidisciplinary

Adaptive Capacity Task Offloading in Multi-Hop D2D-Based Social Industrial IoT

Muhammad Ibrar, Lei Wang, Aamir Akbar, Mian Ahmad Jan, Venki Balasubramanian, Gabriel-Miro Muntean, Nadir Shah

Summary: This paper proposes an adaptive capacity task offloading solution for social industrial IoT based on device-to-device communications and social relationships. Experimental results show that the proposed approach outperforms existing methods.

IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING (2023)

Article Computer Science, Interdisciplinary Applications

Case-Based Reasoning Diagnostic System for Antenatal Research Database

Muhammad Kamran, Ahmed Abdul-Aziz Almaghthawi

Summary: E-health is a promising field of research with immense potential for the benefit of humanity. In this paper, an efficient Intelligent Electronic Medical Record system for antenatal care is proposed, using Case-Based Reasoning to predict patient diagnosis in noisy environments. The experimental results confirm the soundness of the approach and highlight the importance of collaborative efforts from various stakeholders, including medical professionals, software developers, and researchers, for enhancing the performance of e-health.

INTERNATIONAL JOURNAL OF ONLINE AND BIOMEDICAL ENGINEERING (2022)

Article Computer Science, Information Systems

A Novel Database Watermarking Technique Using Blockchain as Trusted Third Party

Ahmed S. Alghamdi, Surayya Naz, Ammar Saeed, Eesa Al Solami, Muhammad Kamran, Mohammed Saeed Alkatheiri

Summary: This research discusses the application of watermarking and blockchain technology in relational databases to protect digital copyrights. The proposed scheme utilizes blockchain as a trusted third party and employs zero watermarking approach, effectively securing the watermark from tampering.

CMC-COMPUTERS MATERIALS & CONTINUA (2022)

暂无数据