Proceedings of the Second Edition of the ICN Workshop on Information-Centric Networking 2012
DOI: 10.1145/2342488.2342491
|View full text |Cite
|
Sign up to set email alerts
|

Exploit the known or explore the unknown?

Abstract: Most Information Centric Networking designs propose the usage of widely distributed in-network storage. However, the huge amount of content exchanged in the Internet, and the volatility of content replicas cached across the network pose significant challenges to the definition of a scalable routing protocol able to address all available copies. In addition, the number of available copies of a given content item and their distribution among caches is clearly impacted by the request forwarding policy.In this pap… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
55
0

Year Published

2013
2013
2017
2017

Publication Types

Select...
4
2
2

Relationship

1
7

Authors

Journals

citations
Cited by 67 publications
(57 citation statements)
references
References 15 publications
0
55
0
Order By: Relevance
“…The benefit of routing towards nearest replicas, rather than towards nearest designated servers, has been observed empirically [13,15,21]. Deghan et al [19], Abedini and Shakkotai [1], and Xie et al [56] all study joint routing and content placement schemes in a bipartite, single-hop setting.…”
Section: Related Workmentioning
confidence: 99%
“…The benefit of routing towards nearest replicas, rather than towards nearest designated servers, has been observed empirically [13,15,21]. Deghan et al [19], Abedini and Shakkotai [1], and Xie et al [56] all study joint routing and content placement schemes in a bipartite, single-hop setting.…”
Section: Related Workmentioning
confidence: 99%
“…Chiocchatti et al [61] evaluated two forwarding approaches, exploitation and exploration. Exploitation is forwarding by FIB, i.e.…”
Section: Data Plane Approachmentioning
confidence: 99%
“…However, we provide 8 built-in topologies: five of them are realistic ISP networks (Geant, Abilene, Level3, Qwest, Sprint), and three are synthetic (random, torus and tree). For each network, ccnSim is able to build different routing FIBs (either precomputing the shortest-path and multiple-path based on standard graph algorithms [15] or possibly with a dynamic flooding-based exploration [14]). As we can observe from Fig.…”
Section: Node Architecturementioning
confidence: 99%
“…Other multi-path strategies, both static [15] and dynamic [14] are already available, while further strategies can be implemented by overwriting the getDecision() method.…”
Section: Node Architecturementioning
confidence: 99%
See 1 more Smart Citation