Performance evaluation of caching placement algorithms in named data network for video on demand service

The purpose of this study is to evaluate the performance of caching placement algorithms (LCD, LCE, Prob, Pprob, Cross, Centrality, and Rand) in Named Data Network (NDN) for Video on Demand (VoD). This study aims to increment the service quality and to decrement the time of download. There are two...

Full description

Saved in:
Bibliographic Details
Main Author: Abbas, Rasha Salem
Format: Thesis
Language:eng
eng
Published: 2016
Subjects:
Online Access:https://etd.uum.edu.my/5634/1/s814897_01.pdf
https://etd.uum.edu.my/5634/2/s814897_02.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
id my-uum-etd.5634
record_format uketd_dc
institution Universiti Utara Malaysia
collection UUM ETD
language eng
eng
advisor Che Mohamed Arif, Ahmad Suki
Habbal, Adib M.Monzer
topic T58.5-58.64 Information technology
spellingShingle T58.5-58.64 Information technology
Abbas, Rasha Salem
Performance evaluation of caching placement algorithms in named data network for video on demand service
description The purpose of this study is to evaluate the performance of caching placement algorithms (LCD, LCE, Prob, Pprob, Cross, Centrality, and Rand) in Named Data Network (NDN) for Video on Demand (VoD). This study aims to increment the service quality and to decrement the time of download. There are two stages of activities resulted in the outcome of the study: The first is to determine the causes of delay performance in NDN cache algorithms used in VoD workload. The second activity is the evaluation of the seven cache placement algorithms on the cloud of video content in terms of the key performance metrics: delay time, average cache hit ratio, total reduction in the network footprint, and reduction in load. The NS3 simulations and the Internet2 topology were used to evaluate and analyze the findings of each algorithm, and to compare the results based on cache sizes: 1GB, 10GB, 100GB, and 1TB. This study proves that the different user requests of online videos would lead to delay in network performance. In addition to that the delay also caused by the high increment of video requests. Also, the outcomes led to conclude that the increase in cache capacity leads to make the placement algorithms have a significant increase in the average cache hit ratio, a reduction in server load, and the total reduction in network footprint, which resulted in obtaining a minimized delay time. In addition to that, a conclusion was made that Centrality is the worst cache placement algorithm based on the results obtained.
format Thesis
qualification_name other
qualification_level Master's degree
author Abbas, Rasha Salem
author_facet Abbas, Rasha Salem
author_sort Abbas, Rasha Salem
title Performance evaluation of caching placement algorithms in named data network for video on demand service
title_short Performance evaluation of caching placement algorithms in named data network for video on demand service
title_full Performance evaluation of caching placement algorithms in named data network for video on demand service
title_fullStr Performance evaluation of caching placement algorithms in named data network for video on demand service
title_full_unstemmed Performance evaluation of caching placement algorithms in named data network for video on demand service
title_sort performance evaluation of caching placement algorithms in named data network for video on demand service
granting_institution Universiti Utara Malaysia
granting_department Awang Had Salleh Graduate School of Arts & Sciences
publishDate 2016
url https://etd.uum.edu.my/5634/1/s814897_01.pdf
https://etd.uum.edu.my/5634/2/s814897_02.pdf
_version_ 1747827961326731264
spelling my-uum-etd.56342021-04-15T01:08:47Z Performance evaluation of caching placement algorithms in named data network for video on demand service 2016 Abbas, Rasha Salem Che Mohamed Arif, Ahmad Suki Habbal, Adib M.Monzer Awang Had Salleh Graduate School of Arts & Sciences Awang Had Salleh Graduate School of Arts and Sciences T58.5-58.64 Information technology The purpose of this study is to evaluate the performance of caching placement algorithms (LCD, LCE, Prob, Pprob, Cross, Centrality, and Rand) in Named Data Network (NDN) for Video on Demand (VoD). This study aims to increment the service quality and to decrement the time of download. There are two stages of activities resulted in the outcome of the study: The first is to determine the causes of delay performance in NDN cache algorithms used in VoD workload. The second activity is the evaluation of the seven cache placement algorithms on the cloud of video content in terms of the key performance metrics: delay time, average cache hit ratio, total reduction in the network footprint, and reduction in load. The NS3 simulations and the Internet2 topology were used to evaluate and analyze the findings of each algorithm, and to compare the results based on cache sizes: 1GB, 10GB, 100GB, and 1TB. This study proves that the different user requests of online videos would lead to delay in network performance. In addition to that the delay also caused by the high increment of video requests. Also, the outcomes led to conclude that the increase in cache capacity leads to make the placement algorithms have a significant increase in the average cache hit ratio, a reduction in server load, and the total reduction in network footprint, which resulted in obtaining a minimized delay time. In addition to that, a conclusion was made that Centrality is the worst cache placement algorithm based on the results obtained. 2016 Thesis https://etd.uum.edu.my/5634/ https://etd.uum.edu.my/5634/1/s814897_01.pdf text eng public https://etd.uum.edu.my/5634/2/s814897_02.pdf text eng public other masters Universiti Utara Malaysia [1] I. Psaras, R. G. Clegg, R. Landa, W. K. Chai, and G. Pavlou, “Modelling and evaluation of ccn-caching trees,” in NETWORKING 2011, pp. 78–91, Springer, 2011. [2] K. M. Zaini, A. M. Habbal, F. Azzali, S. Hassan, and M. Rizal, “An interaction between congestion-control based transport protocols and manet routing protocols,” Journal of Computer Science, vol. 8, no. 4, p. 468, 2012. [3] I. Psaras, W. K. Chai, and G. Pavlou, “Probabilistic in-network caching for information-centric networks,” in Proceedings of the second edition of the ICN workshop on Information-centric networking, pp. 55–60, ACM, 2012. [4] Y. Sun, S. K. Fayaz, Y. Guo, V. Sekar, Y. Jin, M. A. Kaafar, and S. Uhlig, “Tracedriven analysis of icn caching algorithms on video-on-demand workloads,” in Proceedings of the 10th ACM International on Conference on emerging Networking Experiments and Technologies, pp. 363–376, ACM, 2014. [5] C. Yi, J. Abraham, A. Afanasyev, L.Wang, B. Zhang, and L. Zhang, “On the role of routing in named data networking,” in Proceedings of the 1st international conference on Information-centric networking, pp. 27–36, ACM, 2014. [6] X. Liu, F. Dobrian, H. Milner, J. Jiang, V. Sekar, I. Stoica, and H. Zhang, “A case for a coordinated internet video control plane,” in Proceedings of the ACM SIGCOMM 2012 conference on Applications, technologies, architectures, and protocols for computer communication, pp. 359–370, ACM, 2012. [7] T.-Y. Huang, R. Johari, N. McKeown, M. Trunnell, and M. Watson, “A bufferbased approach to rate adaptation: Evidence from a large video streaming service,” in Proceedings of the 2014 ACM conference on SIGCOMM, pp. 187–198, ACM, 2014. [8] J. Liu, A. Panda, A. Singla, B. Godfrey, M. Schapira, and S. Shenker, “Ensuring connectivity via data plane mechanisms.,” in NSDI, pp. 113–126, 2013. [9] C. Bian, Z. Zhu, A. Afanasyev, E. Uzun, and L. Zhang, “Deploying key management on ndn testbed,” UCLA, Peking University and PARC, Tech. Rep, 2013. [10] L. Zhang, D. Estrin, J. Burke, V. Jacobson, J. D. Thornton, D. K. Smetters, B. Zhang, G. Tsudik, D. Massey, C. Papadopoulos, et al., “Named data networking (ndn) project,” Relatorio Tecnico NDN-0001, Xerox Palo Alto Research Center-PARC, 2010. [11] G. Xylomenos, C. N. Ververidis, V. Siris, N. Fotiou, C. Tsilopoulos, X. Vasilakos, K. V. Katsaros, G. C. Polyzos, et al., “A survey of information-centric networking research,” Communications Surveys & Tutorials, IEEE, vol. 16, no. 2, pp. 1024–1049, 2014. [12] C. Fang, F. R. Yu, T. Huang, J. Liu, and Y. Liu, “A survey of energy-efficient caching in information-centric networking,” Communications Magazine, IEEE, vol. 52, no. 11, pp. 122–129, 2014. [13] C. Yi, A. Afanasyev, I. Moiseenko, L.Wang, B. Zhang, and L. Zhang, “A case for stateful forwarding plane,” Computer Communications, vol. 36, no. 7, pp. 779–791, 2013. [14] A. Balachandran, V. Sekar, A. Akella, and S. Seshan, “Analyzing the potential benefits of cdn augmentation strategies for internet video workloads,” in Proceedings of the 2013 conference on Internet measurement conference, pp. 43–56, ACM, 2013. [15] X. Yin, V. Sekar, and B. Sinopoli, “Toward a principled framework to design dynamic adaptive streaming algorithms over http,” in Proceedings of the 13th ACM Workshop on Hot Topics in Networks, p. 9, ACM, 2014. [16] N. Laoutaris, H. Che, and I. Stavrakakis, “The lcd interconnection of lru caches and its analysis,” Performance Evaluation, vol. 63, no. 7, pp. 609–634, 2006. [17] J. Li, H.Wu, B. Liu, and J. Lu, “Effective caching schemes for minimizing interisp traffic in named data networking,” in Parallel and Distributed Systems (ICPADS), 2012 IEEE 18th International Conference on, pp. 580–587, IEEE, 2012. [18] W.Wang, Y. Sun, Y. Guo, D. Kaafar, J. Jin, J. Li, and Z. Li, “Crcache: exploiting the correlation between content popularity and network topology information for icn caching,” in Communications (ICC), 2014 IEEE International Conference on, pp. 3191–3196, IEEE, 2014. [19] W. KOONG CHAI, H. DILIANG, I. Psaras, and G. Pavlou, “Cache less for more in information-centric networks (extended version),” Computer communications, vol. 36, no. 7, pp. 758–770, 2013. [20] Z. Zhu and A. Afanasyev, “Let’s chronosync: Decentralized dataset state synchronization in named data networking,” in Network Protocols (ICNP), 2013 21st IEEE International Conference on, pp. 1–10, IEEE, 2013. [21] Z. Ming, M. Xu, and D. Wang, “Age-based cooperative caching in informationcentric networks,” in Computer Communications Workshops (INFOCOM WKSHPS), 2012 IEEE Conference on, pp. 268–273, IEEE, 2012. [22] C. Huang, J. Li, and K.W. Ross, “Can internet video-on-demand be profitable?,” ACM SIGCOMM Computer Communication Review, vol. 37, no. 4, pp. 133–144, 2007. [23] U. O. Christopher and E. Maria-Gorretti, “Availability and the use of computer and internet by secondary school students in benin city, nigeria,” International Journal of Library and Information Science, vol. 4, no. 2, pp. 16–23, 2012. [24] A. D. Greenberg and J. Zanetis, “The impact of broadcast and streaming video in education,” Cisco: Wainhouse Research, 2012. [25] D. Applegate, A. Archer, V.Gopalakrishnan, S. Lee, and K. K. Ramakrishnan, “Optimal content placement for a large-scale vod system,” in Proceedings of the 6th International COnference, p. 4, ACM, 2010. [26] A.-M. K. Pathan and R. Buyya, “A taxonomy and survey of content delivery networks,” Grid Computing and Distributed Systems Laboratory, University of Melbourne, Technical Report, 2007. [27] M. Gritter and D. R. Cheriton, “An architecture for content routing support in the internet.,” in USITS, vol. 1, pp. 4–4, 2001. [28] V. Jacobson, D. K. Smetters, J. D. Thornton, M. F. Plass, N. H. Briggs, and R. L. Braynard, “Networking named content,” in Proceedings of the 5th international conference on Emerging networking experiments and technologies, pp. 1–12, ACM, 2009. [29] T. Koponen, M. Chawla, B.-G. Chun, A. Ermolinskiy, K. H. Kim, S. Shenker, and I. Stoica, “A data-oriented (and beyond) network architecture,” in ACM SIGCOMM Computer Communication Review, vol. 37, pp. 181–192, ACM, 2007. [30] P. Gasti, G. Tsudik, E. Uzun, and L. Zhang, “Dos and ddos in named data networking,” in Computer Communications and Networks (ICCCN), 2013 22nd International Conference on, pp. 1–7, IEEE, 2013. [31] J. Li, H.Wu, B. Liu, and J. Lu, “Effective caching schemes for minimizing interisp traffic in named data networking,” in Parallel and Distributed Systems (ICPADS), 2012 IEEE 18th International Conference on, pp. 580–587, IEEE, 2012. [32] M. Ambrosin, C. Busold, M. Conti, A.-R. Sadeghi, and M. Schunter, “Updaticator: Updating billions of devices by an efficient, scalable and secure software update distribution over untrusted cache-enabled networks,” in Computer Security-ESORICS 2014, pp. 76–93, Springer, 2014. [33] D. Turner, K. Levchenko, S. Savage, and A. C. Snoeren, “A comparison of syslog and is-is for network failure analysis,” in Proceedings of the 2013 conference on Internet measurement conference, pp. 433–440, ACM, 2013. [34] A. Markopoulou, G. Iannaccone, S. Bhattacharyya, C.-N. Chuah, Y. Ganjali, and C. Diot, “Characterization of failures in an operational ip backbone network,” IEEE/ACM Transactions on Networking (TON), vol. 16, no. 4, pp. 749–762, 2008. [35] J. Erman, A. Gerber, K. Ramadrishnan, S. Sen, and O. Spatscheck, “Over the top video: the gorilla in cellular networks,” in Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference, pp. 127–136, ACM, 2011. [36] A. Suki and C. M. Arif, Slight-Delay Shaped Variable Bit Rate (SD-SVBR) Technique for Video Transmission. PhD thesis, Universiti Utara Malaysia, 2011. [37] A. Afanasyev, P. Mahadevan, I. Moiseenko, E. Uzun, and L. Zhang, “Interest flooding attack and countermeasures in named data networking,” in IFIP Networking Conference, 2013, pp. 1–9, IEEE, 2013. [38] A. Galanopoulos, G. Iosifidis, A. Argyriou, and L. Tassiulas, “Green video delivery in lte-based heterogeneous cellular networks,” in Proceedings of the 19th annual international conference on Mobile computing & networking, pp. 389– 400., 2013. [39] C. V. N. Index, “Forecast and methodology, 2012–2017. cisco white paper, may 29, 2013,” 2014. [40] S. K. Fayazbakhsh, Y. Lin, A. Tootoonchian, A. Ghodsi, T. Koponen, B. Maggs, K. Ng, V. Sekar, and S. Shenker, “Less pain, most of the gain: Incrementally deployable icn,” in ACM SIGCOMM Computer Communication Review, vol. 43, pp. 147–158, ACM, 2013. [41] A. Ghodsi, T. Koponen, J. Rajahalme, P. Sarolahti, and S. Shenker, “Naming in content-oriented architectures,” in Proceedings of the ACM SIGCOMM workshop on Information-centric networking, pp. 1–6, ACM, 2011. [42] A. Ioannou and S. Weber, “Towards on-path caching alternatives in informationcentric networks,” in Local Computer Networks (LCN), 2014 IEEE 39th Conference on, pp. 362–365, IEEE, 2014. [43] M. Draxler and H. Karl, “Efficiency of on-path and off-path caching strategies in information centric networks,” in Green Computing and Communications (GreenCom), 2012 IEEE International Conference on, pp. 581–587, IEEE, 2012. [44] H. Nam, K.-H. Kim, J. Y. Kim, and H. Schulzrinne, “Towards qoe-aware video streaming using sdn,” in Global Communications Conference (GLOBECOM), 2014 IEEE, pp. 1317–1322, IEEE, 2014. [45] J. Jiang, V. Sekar, and H. Zhang, “Improving fairness, efficiency, and stability in http-based adaptive video streaming with festive,” in Proceedings of the 8th international conference on Emerging networking experiments and technologies, pp. 97–108, ACM, 2012. [46] R. K. Mok, X. Luo, E. W. Chan, and R. K. Chang, “Qdash: a qoe-aware dash system,” in Proceedings of the 3rd Multimedia Systems Conference, pp. 11–22, ACM, 2012. [47] R. Margolies, A. Sridharan, V. Aggarwal, R. Jana, N. Shankaranarayanan, V. Vaishampayan, G. Zussman, et al., “Exploiting mobility in proportional fair cellular scheduling: Measurements and algorithms,” in INFOCOM, 2014 Proceedings IEEE, pp. 1339–1347, IEEE, 2014. [48] Q. Xu, S. Mehrotra, Z. Mao, and J. Li, “Proteus: network performance forecast for real-time, interactive mobile applications,” in Proceeding of the 11th annual international conference on Mobile systems, applications, and services, pp. 347– 360, ACM, 2013. [49] M. Claeys, D. Tuncer, J. Famaey, M. Charalambides, S. Latre, F. De Turck, and G. Pavlou, “Towards multi-tenant cache management for isp networks,” in Networks and Communications (EuCNC), 2014 European Conference on, pp. 1–5, IEEE, 2014. 77 [50] W. Rao, L. Chen, A. W.-C. Fu, and G. Wang, “Optimal resource placement in structured peer-to-peer networks,” Parallel and Distributed Systems, IEEE Transactions on, vol. 21, no. 7, pp. 1011–1026, 2010. [51] L. Wang, S. Bayhan, and J. Kangasharju, “Cooperation policies for efficient in-network caching,” in ACM SIGCOMM Computer Communication Review, vol. 43, pp. 533–534, ACM, 2013. [52] S. P. Shariatpanahi, S. A. Motahari, and B. H. Khalaj, “Multi-server coded caching,” arXiv preprint arXiv:1503.00265, 2015. [53] L. Saino, I. Psaras, and G. Pavlou, “Icarus: a caching simulator for information centric networking (icn),” in Proceedings of the 7th International ICST Conference on Simulation Tools and Techniques, pp. 66–75, ICST (Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering), 2014. [54] N. Laoutaris, S. Syntila, and I. Stavrakakis, “Meta algorithms for hierarchical web caches,” in Performance, Computing, and Communications, 2004 IEEE International Conference on, pp. 445–452, IEEE, 2004. [55] K.-Y.Wong, “Web cache replacement policies: a pragmatic approach,” Network, IEEE, vol. 20, no. 1, pp. 28–34, 2006. [56] S. Saha, A. Lukyanenko, and A. Ylä-Jääski, “Efficient cache availability management in information-centric networks,” Computer Networks, vol. 84, pp. 32–45, 2015. [57] L. Yin and G. Cao, “Supporting cooperative caching in ad hoc networks,” Mobile Computing, IEEE Transactions on, vol. 5, no. 1, pp. 77–89, 2006. [58] R. Ravindran, S. Lo, X. Zhang, and G. Wang, “Supporting seamless mobility in named data networking,” in Communications (ICC), 2012 IEEE International Conference on, pp. 5854–5869, IEEE, 2012. [59] J. Li, H. Wu, B. Liu, J. Lu, Y. Wang, X. Wang, Y. Zhang, and L. Dong, “Popularity-driven coordinated caching in named data networking,” in Proceedings of the eighth ACM/IEEE symposium on Architectures for networking and communications systems, pp. 15–26, ACM, 2012. [60] C. Cabral, C. E. Rothenberg, and M. F. Magalhaes, “Mini-ccnx: fast prototyping for named data networking,” in Proceedings of the 3rd ACM SIGCOMM workshop on Information-centric networking, pp. 33–34, ACM, 2013. [61] B. Han, X. Wang, N. Choi, T. Kwon, and Y. Choi, “Amvs-ndn: Adaptive mobile video streaming and sharing in wireless named data networking,” in Computer Communications Workshops (INFOCOM WKSHPS), 2013 IEEE Conference on, pp. 375–380, IEEE, 2013. [62] G. Carofiglio, M. Gallo, L. Muscariello, and D. Perino, “Pending interest table sizing in named data networking,” in Proceedings of the 2nd International Conference on Information-Centric Networking, pp. 49–58, ACM, 2015. 78 [63] C. Yi, A. Afanasyev, L. Wang, B. Zhang, and L. Zhang, “Adaptive forwarding in named data networking,” ACM SIGCOMM computer communication review, vol. 42, no. 3, pp. 62–67, 2012. [64] J. Tang, Z. Zhang, Y. Liu, and H. Zhang, “Identifying interest flooding in named data networking,” in Green Computing and Communications (GreenCom), 2013 IEEE and Internet of Things (iThings/CPSCom), IEEE International Conference on and IEEE Cyber, Physical and Social Computing, pp. 306–310, IEEE, 2013. [65] M. U. Haque, K. Pawlikowski, A. Willig, and L. Bischofs, “Performance analysis of blind routing algorithms over content centric networking architecture,” in Computer and Communication Engineering (ICCCE), 2012 International Conference on, pp. 922–927, IEEE, 2012. [66] G. Tyson, J. Bigham, and E. Bodanese, “Towards an information-centric delaytolerant network,” in Computer Communications Workshops (INFOCOM WKSHPS), 2013 IEEE Conference on, pp. 387–392, IEEE, 2013. [67] G. A. Churchill, T. J. Brown, and T. A. Suter, “Basic marketing research,” 2004. [68] A. Bryman and E. Bell, Business research methods. Oxford university press, 2015. [69] D. A. De Vaus and D. de Vaus, Research design in social research. Sage, 2001. [70] U. Sekaran, Research methods for business: A skill building approach. John Wiley & Sons, 2006. [71] G. Lancaster, Research methods in management. Routledge, 2007. [72] U. Sekaran, “Research methods: A skill building approach. john wiley & sons,” 2011. [73] R. Ahmed, M. F. Bari, S. R. Chowdhury, M. G. Rabbani, R. Boutaba, and B. Mathieu, “alpha route: A name based routing scheme for information centric networks,” in INFOCOM, 2013 Proceedings IEEE, pp. 90–94, IEEE, 2013. [74] G. F. Riley and T. R. Henderson, “The ns-3 network simulator,” in Modeling and Tools for Network Simulation, pp. 15–34, Springer, 2010. [75] T. D. Assefa, “Qos performance of lte networks with network coding,” 2015. [76] W. So, A. Narayanan, and D. Oran, “Named data networking on a router: Fast and dos-resistant forwarding with hash tables,” in Proceedings of the ninth ACM/IEEE symposium on Architectures for networking and communications systems, pp. 215–226, IEEE Press, 2013. [77] L. Saino, I. Psaras, and G. Pavlou, “Hash-routing schemes for information centric networking,” in Proceedings of the 3rd ACM SIGCOMM workshop on Information-centric networking, pp. 27–32, ACM, 2013. [78] B. Stockebrand, “Quality of service (qos),” IPv6 in Practice: A Unixers Guide to the Next Generation Internet, pp. 327–331, 2007. 79 [79] R. Asokan and A. Natarajan, “An approach for reducing the end-to-end delay and increasing network lifetime in mobile adhoc networks,” Int J Inf Technol, vol. 4, no. 2, pp. 121–127, 2008. [80] B. Ahlgren, C. Dannewitz, C. Imbrenda, D. Kutscher, and B. Ohlman, “A survey of information-centric networking,” Communications Magazine, IEEE, vol. 50, no. 7, pp. 26–36, 2012. [81] I. Psaras, W. K. Chai, and G. Pavlou, “In-network cache management and resource allocation for information-centric networks,” Parallel and Distributed Systems, IEEE Transactions on, vol. 25, no. 11, pp. 2920–2931, 2014. [82] G. Zhang, B. Tang, X. Wang, and Y. Wu, “An optimal cache placement strategy based on content popularity in content centric network,” JOICE, pp. 2759–2967, 2014. [83] G. Zhang, B. Tang, P. Wang, Y. Wu, and X. Zhang, “Performance assessment of cache strategies in content centric network,” Information Technology Journal, vol. 12, no. 23, p. 7083, 2013. [84] J. Sung, J.-K. K. Rhee, and S. Jung, “Lightweight caching strategy for wireless content delivery networks,” IEICE Communications Express, vol. 3, no. 4, pp. 150–155, 2014.