4.7 Article

Optimal chunking and partial caching in information-centric networks

期刊

COMPUTER COMMUNICATIONS
卷 61, 期 -, 页码 48-57

出版社

ELSEVIER
DOI: 10.1016/j.comcom.2014.12.009

关键词

Information-centric network; Chunking; In-network caching; Performance analysis; Performance modeling

向作者/读者索取更多资源

Caching is widely used to reduce network traffic and improve user experience. Traditionally caches store complete objects, but video files and the recent emergence of information-centric networking have highlighted a need for understanding how partial caching could be beneficial. In partial caching, objects are divided into chunks which are cached either independently or by exploiting common properties of chunks of the same file. In this paper, we identify why partial caching is beneficial, and propose a way to quantify the benefit. We develop an optimal n-Chunking algorithm with complexity O(ns(2)) for an s-byte file, and compare it with epsilon-optimal homogeneous chunking, where epsilon is bounded by O(n(-2)). Our analytical results and comparison lead to the surprising conclusion that neither sophisticated partial caching algorithm nor high complexity optimal chunking are needed in information-centric networks. Instead, simple utility-based in-network caching algorithm and low complexity homogeneous chunking are sufficient to achieve the most benefits of partial caching. (C) 2014 Elsevier B.V. All rights reserved.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

Article Engineering, Civil

DRLE: Decentralized Reinforcement Learning at the Edge for Traffic Light Control in the IoV

Pengyuan Zhou, Xianfu Chen, Zhi Liu, Tristan Braud, Pan Hui, Jussi Kangasharju

Summary: The Internet of Vehicles (IoV) and efficient traffic light control can create a virtuous cycle, further improved by edge computing. However, there is still a need for efficient solutions for edge-empowered IoV.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2021)

Article Engineering, Civil

AICP: Augmented Informative Cooperative Perception

Pengyuan Zhou, Pranvera Kortoci, Yui-Pan Yau, Benjamin Finley, Xiujun Wang, Tristan Braud, Lik-Hang Lee, Sasu Tarkoma, Jussi Kangasharju, Pan Hui

Summary: The study introduces an Augmented Informative Cooperative Perception (AICP) system that optimizes the informativeness of shared data in connected vehicles. By selecting the most valuable data to display to drivers and filtering out irrelevant data, the system improves data fusion presentation. The experiments show that the system can enhance network performance without significant latency.

IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS (2022)

Proceedings Paper Telecommunications

PISTIS: Composing AWS Spot Instances with Guarantees

Walter Wong, Lorenzo Corneot, Aleksandr Zavodovskit, Jussi Kangasharju

Summary: AWS offers transient instances as a discounted option for unused capacity, but without availability guarantees. This paper presents PISTIS, a framework that ensures reliable computing resources over transient instances by proactively replacing failed components. Evaluation results show that PISTIS can achieve the same reliability as on-demand instances with up to 81% price reduction in the best cases.

IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC 2022) (2022)

Proceedings Paper Computer Science, Hardware & Architecture

(How Much) Can Edge Computing Change Network Latency?

Lorenzo Corneo, Nitinder Mohan, Aleksandr Zavodovski, Walter Wong, Christian Rohner, Per Gunningberg, Jussi Kangasharju

Summary: Edge computing aims to improve application performance and address the issue of data streams generated by IoT devices. Through extensive real-world network measurements and analysis, optimal placement strategies for edge computing facilities can be determined.

2021 IFIP NETWORKING CONFERENCE AND WORKSHOPS (IFIP NETWORKING) (2021)

Proceedings Paper Computer Science, Artificial Intelligence

Surrounded by the Clouds A Comprehensive Cloud Reachability Study

Lorenzo Corneo, Maximilian Eder, Nitinder Mohan, Aleksandr Zavodovski, Suzan Bayhan, Walter Wong, Per Gunningberg, Jussi Kangasharju, Joerg Ott

Summary: The study comprehensively examined the latency measurements from global clients to the cloud and found that modern cloud environments can easily support latency-critical applications for the majority of the world's population, such as cloud gaming.

PROCEEDINGS OF THE WORLD WIDE WEB CONFERENCE 2021 (WWW 2021) (2021)

Proceedings Paper Computer Science, Theory & Methods

Eco-friendly Caching and Forwarding in Named Data Networking

Seng-Kyoun Jo, Lin Wang, Jussi Kangasharju, Max Muelhaeuser

2020 26TH IEEE INTERNATIONAL SYMPOSIUM ON LOCAL AND METROPOLITAN AREA NETWORKS (IEEE LANMAN) (2020)

Proceedings Paper Computer Science, Artificial Intelligence

Prongle: Lightweight Communication over Unassociated Wi-Fi

Otto Waltari, Jussi Kangasharju

PROCEEDINGS OF THE 35TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING (SAC'20) (2020)

Proceedings Paper Computer Science, Hardware & Architecture

DeCloud: Truthful Decentralized Double Auction for Edge Clouds

Aleksandr Zavodovski, Suzan Bayhan, Nitinder Mohan, Pengyuan Zhou, Walter Wong, Jussi Kangasharju

2019 39TH IEEE INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2019) (2019)

Proceedings Paper Computer Science, Information Systems

ERL: Edge based Reinforcement Learning for optimized urban Traffic light control

Pengyuan Zhou, Tristan Braud, Ahmad Alhilal, Pan Hui, Jussi Kangasharju

2019 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS (PERCOM WORKSHOPS) (2019)

Proceedings Paper Computer Science, Information Systems

ExEC: Elastic Extensible Edge Cloud

Aleksandr Zavodovski, Nitinder Mohan, Suzan Bayhan, Walter Wong, Jussi Kangasharju

PROCEEDINGS OF THE 2ND ACM INTERNATIONAL WORKSHOP ON EDGE SYSTEMS, ANALYTICS AND NETWORKING (EDGESYS '19) (2019)

Proceedings Paper Computer Science, Hardware & Architecture

Enhanced Augmented Reality Applications in Vehicle-to-Edge Networks

Pengyuan Zhou, Wenxiao Zhang, Tristan Braud, Pan Hui, Jussi Kangasharju

PROCEEDINGS OF THE 2019 22ND CONFERENCE ON INNOVATION IN CLOUDS, INTERNET AND NETWORKS AND WORKSHOPS (ICIN) (2019)

Proceedings Paper Computer Science, Theory & Methods

ICON: Intelligent Container Overlays

Aleksandr Zavodovski, Nitinder Mohan, Suzan Bayhan, Walter Wong, Jussi Kangasharju

HOTNETS-XVII: PROCEEDINGS OF THE 2018 ACM WORKSHOP ON HOT TOPICS IN NETWORKS (2018)

Proceedings Paper Computer Science, Information Systems

QAware: A Cross-Layer Approach to MPTCP Scheduling

Tanya Shreedhar, Nitinder Mohan, Sanjit K. Kaul, Jussi Kangasharju

2018 IFIP NETWORKING CONFERENCE (IFIP NETWORKING) AND WORKSHOPS (2018)

Proceedings Paper Energy & Fuels

Green Named Data Networking Using Renewable Energy

Seng-Kyoun Jo, Lin Wang, Jussi Kangasharju, Max Muehlhaeuser

E-ENERGY'18: PROCEEDINGS OF THE 9TH ACM INTERNATIONAL CONFERENCE ON FUTURE ENERGY SYSTEMS (2018)

Article Engineering, Electrical & Electronic

Edge-Facilitated Augmented Vision in Vehicle-to-Everything Networks

Pengyuan Zhou, Tristan Braud, Aleksandr Zavodovski, Zhi Liu, Xianfu Chen, Pan Hui, Jussi Kangasharju

IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2020)

Review Computer Science, Information Systems

A review of Machine Learning (ML)-based IoT security in healthcare: A dataset perspective

Euclides Carlos Pinto Neto, Sajjad Dadkhah, Somayeh Sadeghi, Heather Molyneaux, Ali A. Ghorbani

Summary: The Internet of Things (IoT) has the potential to revolutionize medical treatment in healthcare, but it also faces security threats. Advanced analytics can enhance IoT security, but generating realistic datasets is complex. This research conducts a review of Machine Learning (ML) solutions for IoT security in healthcare, focusing on existing datasets, resources, applications, and challenges, to highlight the current landscape and future requirements.

COMPUTER COMMUNICATIONS (2024)

Article Computer Science, Information Systems

Role of context in determining transfer of risk knowledge in roundabouts

Duncan Deveaux, Takamasa Higuchi, Seyhan Ucar, Jerome Harri, Onur Altintas

Summary: This paper investigates the ability to predict the risk patterns of vehicles in a roundabout and suggests that constraining knowledge transfer to roundabouts with a similar context can significantly improve accuracy.

COMPUTER COMMUNICATIONS (2024)

Article Computer Science, Information Systems

Intelligent wireless sensing driven metaverse: A survey

Lingjun Zhao, Qinglin Yang, Huakun Huang, Longtao Guo, Shan Jiang

Summary: Metaverse seamlessly integrates the real and virtual worlds, and intelligent wireless sensing technology can serve as an intelligent, flexible, non-contact way to access the metaverse and accelerate the establishment of a bridge between the real physical world and the metaverse. However, there are still challenges and open issues in this field.

COMPUTER COMMUNICATIONS (2024)

Article Computer Science, Information Systems

PrivMaskFL: A private masking approach for heterogeneous federated learning in IoT

Jing Xiong, Hong Zhu

Summary: With the rapid growth of data in the era of IoT, the challenge of data privacy protection arises. This article proposes a federated learning approach that uses collaborative training to obtain a global model without direct exposure to local datasets. By utilizing dynamic masking and adaptive differential privacy methods, the approach reduces communication overhead and improves the converge performance of the model.

COMPUTER COMMUNICATIONS (2024)

Article Computer Science, Information Systems

Quantum-resistant Transport Layer Security

Carlos Rubio Garcia, Simon Rommel, Sofiane Takarabt, Juan Jose Vegas Olmos, Sylvain Guilley, Philippe Nguyen, Idelfonso Tafur Monroy

Summary: The reliance on asymmetric public key cryptography and symmetric encryption for cyber-security in current telecommunication networks is threatened by quantum computing technology. Quantum Key Distribution and post-quantum cryptography provide resistance to quantum attacks. This paper proposes two novel hybrid solutions integrating QKD and PQC into TLS for quantum-resistant key exchange.

COMPUTER COMMUNICATIONS (2024)

Article Computer Science, Information Systems

Resource allocation for cost minimization of a slice broker in a 5G-MEC scenario

Annisa Sarah, Gianfranco Nencioni

Summary: This article explores the concept of a Slice Broker, an intermediate entity that purchases resources from Infrastructure Providers to offer customized network slices to users. The article proposes a cost-minimization problem and compares it with alternative problems to demonstrate its effectiveness and cost-saving capabilities.

COMPUTER COMMUNICATIONS (2024)

Article Computer Science, Information Systems

MBP: Multi-channel broadcast proxy re-encryption for cloud-based IoT devices

Sumana Maiti, Sudip Misra, Ayan Mondal

Summary: The broadcast proxy re-encryption methods extend traditional proxy re-encryption mechanisms and propose a scheme called MBP for IoT applications. MBP calculates a single re-encryption key for all user groups and uses multi-channel broadcast encryption to reduce security element size. However, it increases computation time for receiver IoT devices. The use of Rubinstein-Stahl bargaining game approach addresses this issue and MBP is secure against selective group chosen-ciphertext attack in the random oracle model.

COMPUTER COMMUNICATIONS (2024)

Article Computer Science, Information Systems

NextGenV2V: Authenticated V2V communication for next generation vehicular network using (2, n)-threshold scheme

Pankaj Kumar, Hari Om

Summary: This paper presents NextGenV2V, a protocol for the next-generation vehicular network that achieves authenticated communication between vehicles using symmetric keys and a (2, n)-threshold scheme. The protocol reduces communication overhead and improves authentication delay, ensuring better security. Comparative analysis demonstrates the suitability of NextGenV2V in next-generation vehicular networks.

COMPUTER COMMUNICATIONS (2024)

Article Computer Science, Information Systems

A multi-agent federated reinforcement learning-based optimization of quality of service in various LoRa network slices

Eric Ossongo, Moez Esseghir, Leila Merghem-Boulahia

Summary: The implementation of 5G networks allows for the efficient coexistence of heterogeneous services in a single physical virtualized infrastructure. Virtualization of network functions enables more flexible resource management and customizable services. However, the increasing number of connected objects poses challenges in managing physical and virtual resources, requiring intelligent systems to ensure communication quality.

COMPUTER COMMUNICATIONS (2024)

Article Computer Science, Information Systems

PiGateway: Real-time granular analysis of smart home network traffic using P4

Suvrima Datta, U. Venkanna

Summary: The Internet of Things (IoT) enables real-time sensing and data transmission to make homes smarter. Effective device-type identification methods are crucial as the number of IoT devices continues to grow. In this paper, a P4-based gateway called PiGateway is proposed to classify and prioritize the type of IoT devices. By utilizing a decision tree model and flow rules, PiGateway enables real-time granular analysis and in-network classification of IoT traffic.

COMPUTER COMMUNICATIONS (2024)

Article Computer Science, Information Systems

Resource management in multi-heterogeneous cluster networks using intelligent intra-clustered federated learning

Fahad Razaque Mughal, Jingsha He, Nafei Zhu, Saqib Hussain, Zulfiqar Ali Zardari, Ghulam Ali Mallah, Md. Jalil Piran, Fayaz Ali Dharejo

Summary: This paper explores the relationship between heterogeneous cluster networks and federated learning, as well as the challenges of implementing federated learning in heterogeneous networks and the Internet of Things. The authors propose an Intra-Clustered FL (ICFL) model that optimizes computation and communication to select heterogeneous FL nodes in each cluster, enabling efficient processing of asynchronous data and ensuring data security.

COMPUTER COMMUNICATIONS (2024)

Article Computer Science, Information Systems

QoS aware resource allocation for coexistence mechanisms between eMBB and URLLC: Issues, challenges, and future directions in 5G

Rajesh Kumar, Deepak Sinwar, Vijander Singh

Summary: This paper investigates the coexistence mechanisms between eMBB and URLLC traffic for resource scheduling in 5G. Through examining different approaches and performance metrics, it provides detailed insights for researchers in the field, and highlights key issues, challenges, and future directions.

COMPUTER COMMUNICATIONS (2024)

Article Computer Science, Information Systems

Enabling simulation services for digital twins of 5G/B5G mobile networks

Giovanni Nardini, Giovanni Stea

Summary: Digital Twins of Networks (DTNs) are proposed as digital replicas of physical entities, enabling efficient data-driven network management and performance-driven network optimization. DTNs provide simulation services for dynamic reconfiguration and fault anticipation, using discrete-event network simulators as the ideal tools. Challenges include centralized vs. distributed implementation, input gathering from the physical network, security issues and hosting. The possibilities of network simulation for what-if analysis are explored, with the concepts of lockstep and branching analysis defined.

COMPUTER COMMUNICATIONS (2024)

Article Computer Science, Information Systems

DINNRS: A Distributed In-Network Name Resolution System for information-centric networks

Zhaolin Ma, Jiali You, Haojiang Deng

Summary: This paper presents the Distributed In-Network Name Resolution System (DINNRS), which leverages software-defined networking and Information-Centric Networking (ICN) paradigm to provide high scalability and minimal request delay. Our methods, including an enhanced marked cuckoo filter for fast resolving, achieve significant performance gains in simulation experiments.

COMPUTER COMMUNICATIONS (2024)

Article Computer Science, Information Systems

Dynamic WiFi indoor positioning based on the multi-scale metric learning

Yujie Wang, Ying Wang, Qingqing Liu, Yong Zhang

Summary: This paper proposes a dynamic indoor positioning method based on multi-scale metric learning of the channel state information (CSI). By constructing few-shot learning tasks, this method can achieve dynamic positioning using CSI signals without additional equipment. Experimental results show that compared to commonly used dynamic location and tracking algorithms, the proposed method has higher positioning accuracy and does not accumulate errors.

COMPUTER COMMUNICATIONS (2024)