Proceedings of the 3rd ACM SIGCOMM Workshop on Information-Centric Networking 2013
DOI: 10.1145/2491224.2491232
|View full text |Cite
|
Sign up to set email alerts
|

Hash-routing schemes for information centric networking

Abstract: Hash-routing has been proposed in the past as a mapping mechanism between object requests and cache clusters within enterprise networks.In this paper, we revisit hash-routing techniques and apply them to Information-Centric Networking (ICN) environments, where network routers have cache space readily available. In particular, we investigate whether hash-routing is a viable and efficient caching approach when applied outside enterprise networks, but within the boundaries of a domain.We design five different has… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
86
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 119 publications
(86 citation statements)
references
References 23 publications
(34 reference statements)
0
86
0
Order By: Relevance
“…Saino et al [17] use a hash routing scheme in Information Centric Networks. This solution enables forwarding Interest using prefixes' hash and caching content in a single node defined by this hash.…”
Section: Related Workmentioning
confidence: 99%
“…Saino et al [17] use a hash routing scheme in Information Centric Networks. This solution enables forwarding Interest using prefixes' hash and caching content in a single node defined by this hash.…”
Section: Related Workmentioning
confidence: 99%
“…L. Saino et al [56] and S. Saha et al [57] proposed hash-routing approach for content oriented networks (not specified to CCN).…”
Section: Control Plane Approachmentioning
confidence: 99%
“…Saino et al [56] proposed Hash-Routing for content oriented networks. In their proposal, each content has its pre-designated router to be cached.…”
Section: Control Plane Approachmentioning
confidence: 99%
“…If the requested Data is not delivered by the best path, router selects the second best interface to forward the Interest again. Hash-based routing is used in [20,31] and [38]. In [41], the same number of routers are formed as groups or clusters and each group stored Data in dedicated router by using modulo hashing.…”
Section: Related Workmentioning
confidence: 99%