Understanding scoped-flooding for content discovery and caching in content networks

Liang Wang, Suzan Bayhan, Jorg Ott, Jussi Kangasharju, Jon Crowcroft

Research output: Contribution to journalArticlepeer-review

8 Scopus citations

Abstract

Scoped-flooding is used for content discovery in a broad networking context and it has significant impact on the design of caching algorithms in a communication network. Despite its wide usage, a thorough analysis on how scoped-flooding affects a network's performance, e.g., caching and content discovery efficiency, is missing. To develop a better understanding, we first model the behavior of scoped-flooding by the help of a theoretical model on network growth and utility. Next, we investigate the effects of scoped-flooding on various topologies in information-centric networks (ICNs). Using the proposed ring model, we show that flooding can be constrained within a small neighborhood to achieve most of the gains which come from areas with relatively low growth rate, i.e., the network edge. We also study two flooding strategies and compare their behaviors. Given that caching schemes favor more popular items in competition for cache space, popular items are expected to be stored in diverse parts of the network compared to the less popular items. We propose to exploit the resulting divergence in availability along with the routers' topological properties to fine tune the flooding radius. Our results shed light on designing both efficient content discovery mechanism and effective caching algorithms for future ICN.

Original languageEnglish
Article number8384231
Pages (from-to)1887-1900
Number of pages14
JournalIEEE Journal on Selected Areas in Communications
Volume36
Issue number8
DOIs
StatePublished - Aug 2018

Keywords

  • Scoped-flooding
  • caching
  • content discovery
  • graph analysis
  • information-centric network
  • network growth
  • network protocol
  • optimization

Fingerprint

Dive into the research topics of 'Understanding scoped-flooding for content discovery and caching in content networks'. Together they form a unique fingerprint.

Cite this