RTT-based Caching Policies to Improve User-Centric Performance in CCN

被引:6
|
作者
Yokota, Kenji [1 ]
Sugiyama, Kohei [1 ]
Kurihara, Jun [1 ]
Tagami, Atsushi [1 ]
机构
[1] KDDI R&D Labs Inc, 2-1-15 Ohara, Fujimino, Saitama 3568502, Japan
来源
IEEE 30TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS IEEE AINA 2016 | 2016年
关键词
Caching policy; Content-Centric Networking; Round-Trip Time; User-centric performance;
D O I
10.1109/AINA.2016.32
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Content-Centric Networking (CCN) is an attractive future Internet architecture that enables rapid data retrieval due to its native in-network caching mechanism. However, existing caching policies in CCN do not always perform effectively in terms of the user-centric performance that is typically measured by the content download time. This is because they have been designed to improve network-centric performances, such as cache hit ratio and hop count. In this paper, we focus on the Round-Trip Time (RTT) computed at routers, and present two caching policies based on the RTT in order to achieve the high user-centric performance. Our policies have the advantage that they can be deployed with no modification of the CCN packet structure in contrast to the existing ones. This paper demonstrates that our policies achieve much shorter download time than the existing ones over various network topologies, and provides deep insights on caching policies to improve the user-centric performance.
引用
收藏
页码:124 / 131
页数:8
相关论文
共 50 条
  • [11] Security and Performance Challenges for User-Centric Wireless Networking
    Frangoudis, Pantelis A.
    Polyzos, George C.
    IEEE COMMUNICATIONS MAGAZINE, 2014, 52 (12) : 48 - 55
  • [12] Benchmarking Private Cloud Performance with User-Centric Metrics
    Sun, Bin
    Hall, Brian
    Wang, Hu
    Zhang, Da Wei
    Ding, Kai
    2014 IEEE INTERNATIONAL CONFERENCE ON CLOUD ENGINEERING (IC2E), 2014, : 311 - 318
  • [13] Formal Specification and Verification of User-centric Privacy Policies for Ubiquitous Systems
    Joshaghani, Rezvan
    Black, Stacy
    Sherman, Elena
    Mehrpouyan, Hoda
    IDEAS '19: PROCEEDINGS OF THE 23RD INTERNATIONAL DATABASE APPLICATIONS & ENGINEERING SYMPOSIUM (IDEAS 2019), 2019, : 252 - 261
  • [14] Performance Analysis for User-Centric Dense Networks With mmWave
    Shi, Jianfeng
    Pan, Cunhua
    Zhang, Wence
    Chen, Ming
    IEEE ACCESS, 2019, 7 : 14537 - 14548
  • [15] A user-centric evaluation of the readability of privacy policies in popular web sites
    Ravi Inder Singh
    Manasa Sumeeth
    James Miller
    Information Systems Frontiers, 2011, 13 : 501 - 514
  • [16] User-centric performance analysis of market-based cluster batch schedulers
    Chun, BN
    Culler, DE
    CCGRID 2002: 2ND IEEE/ACM INTERNATIONAL SYMPOSIUM ON CLUSTER COMPUTING AND THE GRID, PROCEEDINGS, 2002, : 30 - 38
  • [17] User-centric In-network Caching Mechanism for Off-chain Storage with Blockchain
    Yamanaka, Hiroaki
    Teranishi, Yuuichi
    Hayamizu, Yusaku
    Ooka, Atsushi
    Matsuzono, Kazuhisa
    Li, Ruidong
    Asaeda, Hitoshi
    IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC 2022), 2022, : 1076 - 1081
  • [18] Development of a Security Application based on User-centric Evaluation
    Jeong, Jongmun
    Hwang, Mintae
    2016 6TH INTERNATIONAL CONFERENCE ON IT CONVERGENCE AND SECURITY (ICITCS 2016), 2016, : 225 - 228
  • [19] The performance of recommender systems in online shopping: A user-centric study
    Dabrowski, Maciej
    Acton, Thomas
    EXPERT SYSTEMS WITH APPLICATIONS, 2013, 40 (14) : 5551 - 5562
  • [20] User-Centric Identity Management Based on Secure Elements
    Boeger, Davi
    Barreto, Luciano
    Fraga, Joni
    Urien, Pascal
    Aissaoui, Hassane
    Santos, Andre
    Pujolle, Guy
    2014 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATION (ISCC), 2014,