SlideShare uma empresa Scribd logo
1 de 27
Congestion Control in
NDN
SHAHNEEL SIDDIQUI
Presentation Outline
▪ Brief Introduction on NDN
▪ NDN Performance Analysis
▪ Overload Characteristics of NDN Network
▪ Performance Deterioration Mechanism
▪ Congestion Control Methods
▪ Method 1: Caching Control
▪ Method 2: Interest Forwarding Control
▪ Evaluation of Caching Control
▪ Evaluation of Forwarding Control
▪ Conclusions
2/28
Brief Introduction on NDN
▪ NDN uses two types of packets: Interest & Data
▪ Each NDN router maintains three kind of tables
▪ Content Store (CS),
▪ Pending Interest Table (PIT)
▪ Forwarding Information Base (FIB).
▪ The CS caches received Data Packet temporarily
▪ The PIT records an Interest Packet that has been forwarded, waiting for the Data
Packet to return
▪ The FIB corresponds to the routing table in IP network except that it contains data
name instead of IP address.
3/28
NDN Performance Analysis
▪ The simulations are ran by changing the number of users from 1600 to 2000
▪ Each user generates the content request with the same rate, so the number of
content requests is proportional to the number of users
▪ NDN is expected to achieve more efficient content delivery owing to in-network
caching than IP network
▪ However, the router cache size is limited. It is assumed that every router has the
cache capacity that is 5% of the total amount of contents
4/28
Overload Characteristics of NDN Network
▪ The figure below shows the average value of the maximum content acquisition time
for each user as well as the number of request retransmission
▪ It can be seen that both of the content acquisition time and the number of re-request
are extended with increase in the number of users
▪ The timeout period for the user to retransmit the Interest was assumed to 5 seconds.
5/28
Overload Characteristics of NDN Network (Continued)
▪ To explain the simulation results, the notations are as shown below
▪ The router RA and router RB are connected by a bidirectional link.
▪ The link from RA to RB is LA,B and its usage rate is ρ (LA, B)
▪ Similarly, the link from RB to RA is LB,A and its usage rate is ρ (LB, A)
▪ If the utilization of a given link exceeds the threshold level (say, 80%), the link is
referred to a congestion link
6/28
Overload Characteristics of NDN Network (Continued)
▪ For link utilization, when the number of users was
2000, the congestion links were L34,0, L35,2, L36,2
and L2,4
▪ The time variation of the congested link utilization
is shown in Figure
▪ As the number of users increases, the link
utilization also increases.
7/28
Overload Characteristics of NDN Network (Continued)
▪ Particularly, utilization of L2,4 remained at almost
100% during the simulation period.
▪ Due to the limited router cache capacity, content
that does not fit in the cache will be cached in the
upstream router along the path.
▪ As a result, the utilization of the upstream link
gradually rises.
▪ Link congestion is considered to be generated in
this way.
8/28
Overload Characteristics of NDN Network (Continued)
▪ The router whose incoming link is congested (e.g., Router RA with congestion link LB,A)
▪ Routers corresponding to this condition were R0, R2 and R4
▪ For router RA the cache hit rate of interest packets towards the link LA,B was
measured
▪ It can be seen that the cache hit rate is reduced as the number of user increases
9/28
Performance Deterioration Mechanism
▪ It can be assumed that the performance deterioration of NDN occurs in the
following mechanism as shown
1. When so many content requests occur, Interests may concentrate on specific routers
within a network.
2. At the router RD where Interests are concentrated, a large amount of Data
corresponding to the Interests are returned and cached. When the cache is full, the
cache replacement occurs frequently and cache hit rate decreases.
10/28
Performance Deterioration Mechanism (Continued)
▪ It can be assumed that the performance deterioration of NDN occurs in the
following mechanism as shown
3. By a decrease in cache hit rate, many Interests are forwarded to the outgoing link LD,U
4. In response to these Interests, a large amount of Data flows into the incoming link LU,D
5. When the link LU, D becomes congested, Data Packets are dropped.
11/28
Performance Deterioration Mechanism (Continued)
▪ It can be assumed that the performance deterioration of NDN occurs in the
following mechanism as shown
6. Then timeout occurs on the user side, and the user retransmits the Interest to the
network.
7. The user repeats re-request until the acquisition of the desired data.
12/28
Congestion Control Methods
▪ Method 1: Caching Control
▪ In the case when the link LU,D is congested, if Data from LU,D can be cached in higher
priority at the router RD, the future Interests would not be forwarded to LD,U
▪ This improves that the cache hit rate of the Interests towards LD,U and mitigates the
congestion of link LD,U
▪ Method 2: Interest forwarding control
▪ When the router RD detects congestion at the incoming link LU,D, it redirects the Interest to
other interface than that of LD,U.
▪ By doing so, the congestion of link LU,D would be mitigated
13/28
Method 1: Caching Control
▪ The objective of this method is to improve the cache hit rate of the Interest toward
the interface whose incoming link is congested
▪ For this purpose, we modify the LRU (least recently used) data, that is the default
caching policy of NDN
▪ In the case where the router RD has received a Data Packet and the cache of
router RD is full, then
1. When the incoming link utilization ρ (LU, D) is less than the threshold (80%), the router RD
applies the normal LRU.
2. When the incoming link utilization ρ (LU, D) is not less than the threshold value (80%), the router
RD searches for the LRU data and examines whether it has been received from the congestion
link LU, D. If so, the router RD searches for the next LRU data.
14/28
Method 2: Interest Forwarding Control
▪ The objective of this method is to reduce the usage rate of the congestion links
▪ For this purpose, each router detects congestion in its incoming links and if it
detects congestion, it does not forward the Interest to that interface and searches
for alternate paths
▪ The alternate path should be short and loop-free. For this purpose, Method 2
uses the number of hops to the Publisher at each router
15/28
Method 2: Interest Forwarding Control (Continued)
▪ In Method 2, the path (or interface) selection for interest forwarding is achieved in
two phases, namely
1. Candidate Interface Selection
2. Forwarding Interface Selection
17/28
Candidate Interface Selection Phase
▪ The router selects candidate interface(s) for Interest forwarding based on the
following conditions
1. The interface whose incoming link utilization is less than the threshold (80%).
2. The interface having the minimum hop to the publisher
▪ In the following example, since the F1 is excluded by the condition 1, the
candidate interface becomes the F2 and F3
18/28
Forwarding Interface Selection Phase
▪ Depending on the number of candidate interface N, the forwarding interface is
selected as follows.
▪ The interface having the minimum hop to the publisher among the candidate
interfaces.
▪ If there are more than two interfaces having the minimum hop, the interface whose
incoming link utilization is the lowest is selected
19/28
EVALUATION OF PROPOSED CONTROLS
20/28
▪ First, with no control, the link utilization in the network is measured.
▪ Congestion appeared at links L35,2, L36,2, and L2,4 whose locations in the network
are shown
Evaluation of Caching Control
21/28
▪ Maximum Content Acquisition Time
▪ By control, the content acquisition time was reduced by 20.74% in maximum (trial 4) and 16.1%
in average
Evaluation of Caching Control (Continued)
22/28
▪ Congestion Link Utilization
▪ We can see that our control mitigates the congestion of L36,2 and L35,2 by 9.3% and 7.2%
respectively
▪ Meanwhile in the link L2,4, the utilization had reached 100% even under control.
Evaluation of Caching Control (Continued)
23/28
▪ Cache Hit Rate
▪ In the router R4, significant improvement in cache hit rate can be seen.
▪ But opposite effect was observed in R2
▪ Because the R2 was adjacent to two congestion links (L35,2 and L36,2),
Evaluation of Caching Control (Continued)
24/28
Evaluation of Forwarding Control
▪ Maximum Content Acquisition Time
▪ By control, the content acquisition time was reduced by 30.1% in maximum (trial 4) and 24.2% in
average
25/28
▪ Congestion Link Utilization
▪ Without control the utilization of the congestion links has remained around 80%.
▪ With control, it was improved by from 94.6% to 85.3%.
Evaluation of Forwarding Control (Continued)
26/28
Conclusions
▪ By these controls discussed earlier, link congestion was mitigated and content
acquisition time was significantly improved
▪ Caching control helps mitigates link congestion indirectly by caching the data
packet coming from congested link thus decreasing the interest packets that are
forwarded to the outgoing link of the interface
▪ Forwarding control contributes more directly in decreasing the interest packets by
redirecting them to other interfaces.
▪ Forwarding Control found to be more effective because caching control was only
effective when the router is connected to a single congestion link
27/28
Thank You
Questions and Suggestions are welcomed !

Mais conteúdo relacionado

Mais procurados

PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...
ijp2p
 
Cluster based routing protocol
Cluster based routing protocolCluster based routing protocol
Cluster based routing protocol
Sudhansu Dash
 
File_Transfer_Protocol_Design
File_Transfer_Protocol_DesignFile_Transfer_Protocol_Design
File_Transfer_Protocol_Design
Vishal Vasudev
 
11gsmpo b-en-gsmgsmnetworksdcchcongestionsolutions-word-201009-130915134031-p...
11gsmpo b-en-gsmgsmnetworksdcchcongestionsolutions-word-201009-130915134031-p...11gsmpo b-en-gsmgsmnetworksdcchcongestionsolutions-word-201009-130915134031-p...
11gsmpo b-en-gsmgsmnetworksdcchcongestionsolutions-word-201009-130915134031-p...
Emmanuel Msumali
 
A novel token based approach towards packet loss control
A novel token based approach towards packet loss controlA novel token based approach towards packet loss control
A novel token based approach towards packet loss control
eSAT Journals
 
Cellular network planning_and_optimization_part11
Cellular network planning_and_optimization_part11Cellular network planning_and_optimization_part11
Cellular network planning_and_optimization_part11
Farzad Ramin
 

Mais procurados (20)

PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...
PERFORMANCE ANALYSIS AND COMPARISON OF IMPROVED DSR WITH DSR, AODV AND DSDV R...
 
Mcseminar
McseminarMcseminar
Mcseminar
 
F03201028033
F03201028033F03201028033
F03201028033
 
Admission control
Admission controlAdmission control
Admission control
 
Mc unit 4-jwfiles
Mc unit 4-jwfilesMc unit 4-jwfiles
Mc unit 4-jwfiles
 
Congestion control and quality of service
Congestion control and quality of serviceCongestion control and quality of service
Congestion control and quality of service
 
Congestion Control in Wireless Sensor Networks- An overview of Current Trends
Congestion Control in Wireless Sensor Networks- An overview of Current TrendsCongestion Control in Wireless Sensor Networks- An overview of Current Trends
Congestion Control in Wireless Sensor Networks- An overview of Current Trends
 
Simulation based Evaluation of a Simple Channel Distribution Scheme for MANETs
Simulation based Evaluation of a Simple Channel Distribution Scheme for MANETsSimulation based Evaluation of a Simple Channel Distribution Scheme for MANETs
Simulation based Evaluation of a Simple Channel Distribution Scheme for MANETs
 
Congetion Control.pptx
Congetion Control.pptxCongetion Control.pptx
Congetion Control.pptx
 
Data link control
Data link controlData link control
Data link control
 
Transportlayer tanenbaum
Transportlayer tanenbaumTransportlayer tanenbaum
Transportlayer tanenbaum
 
Cluster based routing protocol
Cluster based routing protocolCluster based routing protocol
Cluster based routing protocol
 
File_Transfer_Protocol_Design
File_Transfer_Protocol_DesignFile_Transfer_Protocol_Design
File_Transfer_Protocol_Design
 
Congestion Control
Congestion ControlCongestion Control
Congestion Control
 
IMPROVING SCFQ TO SUPPORT BURSTY TRAFFIC
IMPROVING SCFQ TO SUPPORT BURSTY TRAFFICIMPROVING SCFQ TO SUPPORT BURSTY TRAFFIC
IMPROVING SCFQ TO SUPPORT BURSTY TRAFFIC
 
11gsmpo b-en-gsmgsmnetworksdcchcongestionsolutions-word-201009-130915134031-p...
11gsmpo b-en-gsmgsmnetworksdcchcongestionsolutions-word-201009-130915134031-p...11gsmpo b-en-gsmgsmnetworksdcchcongestionsolutions-word-201009-130915134031-p...
11gsmpo b-en-gsmgsmnetworksdcchcongestionsolutions-word-201009-130915134031-p...
 
A novel token based approach towards packet loss control
A novel token based approach towards packet loss controlA novel token based approach towards packet loss control
A novel token based approach towards packet loss control
 
A novel token based approach towards packet loss
A novel token based approach towards packet lossA novel token based approach towards packet loss
A novel token based approach towards packet loss
 
Cellular network planning_and_optimization_part11
Cellular network planning_and_optimization_part11Cellular network planning_and_optimization_part11
Cellular network planning_and_optimization_part11
 
Ttsl orissa-egprs-download-throughput-improved-new
Ttsl orissa-egprs-download-throughput-improved-newTtsl orissa-egprs-download-throughput-improved-new
Ttsl orissa-egprs-download-throughput-improved-new
 

Semelhante a Congestion Control in NDN

Performance Evaluation of Source Routing over MPLS Networks for Failure Detec...
Performance Evaluation of Source Routing over MPLS Networks for Failure Detec...Performance Evaluation of Source Routing over MPLS Networks for Failure Detec...
Performance Evaluation of Source Routing over MPLS Networks for Failure Detec...
Eswar Publications
 
Transport control protocols for Wireless sensor networks
Transport control protocols for Wireless sensor networksTransport control protocols for Wireless sensor networks
Transport control protocols for Wireless sensor networks
Rushin Shah
 

Semelhante a Congestion Control in NDN (20)

Qs.pptx
Qs.pptxQs.pptx
Qs.pptx
 
ROUTING PROTOCOLS new.pptx
ROUTING PROTOCOLS new.pptxROUTING PROTOCOLS new.pptx
ROUTING PROTOCOLS new.pptx
 
Experimental Evaluation of Large Scale WiFi Multicast Rate Control, By: Varun...
Experimental Evaluation of Large Scale WiFi Multicast Rate Control, By: Varun...Experimental Evaluation of Large Scale WiFi Multicast Rate Control, By: Varun...
Experimental Evaluation of Large Scale WiFi Multicast Rate Control, By: Varun...
 
16 coms 525 tcpip - routing protocols -all
16    coms 525 tcpip - routing protocols -all16    coms 525 tcpip - routing protocols -all
16 coms 525 tcpip - routing protocols -all
 
Routing Techniques
Routing TechniquesRouting Techniques
Routing Techniques
 
MANET Routing Protocols , a case study
MANET Routing Protocols , a case studyMANET Routing Protocols , a case study
MANET Routing Protocols , a case study
 
DSR,LSR,IGMP,RIP,OSPF.ppt
DSR,LSR,IGMP,RIP,OSPF.pptDSR,LSR,IGMP,RIP,OSPF.ppt
DSR,LSR,IGMP,RIP,OSPF.ppt
 
Experimental Analysis Of On Demand Routing Protocol
Experimental Analysis Of On Demand Routing ProtocolExperimental Analysis Of On Demand Routing Protocol
Experimental Analysis Of On Demand Routing Protocol
 
Routing.ppt
Routing.pptRouting.ppt
Routing.ppt
 
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETSAN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
AN EFFECTIVE CONTROL OF HELLO PROCESS FOR ROUTING PROTOCOL IN MANETS
 
An Effective Control of Hello Process for Routing Protocol in MANETs
An Effective Control of Hello Process for Routing Protocol in MANETsAn Effective Control of Hello Process for Routing Protocol in MANETs
An Effective Control of Hello Process for Routing Protocol in MANETs
 
CN WEEK 11.pdf
CN WEEK 11.pdfCN WEEK 11.pdf
CN WEEK 11.pdf
 
IRJET- Performance Improvement of Wireless Network using Modern Simulation Tools
IRJET- Performance Improvement of Wireless Network using Modern Simulation ToolsIRJET- Performance Improvement of Wireless Network using Modern Simulation Tools
IRJET- Performance Improvement of Wireless Network using Modern Simulation Tools
 
Performance Evaluation of Source Routing over MPLS Networks for Failure Detec...
Performance Evaluation of Source Routing over MPLS Networks for Failure Detec...Performance Evaluation of Source Routing over MPLS Networks for Failure Detec...
Performance Evaluation of Source Routing over MPLS Networks for Failure Detec...
 
Transport control protocols for Wireless sensor networks
Transport control protocols for Wireless sensor networksTransport control protocols for Wireless sensor networks
Transport control protocols for Wireless sensor networks
 
IRJET- Simulation Analysis of a New Startup Algorithm for TCP New Reno
IRJET- Simulation Analysis of a New Startup Algorithm for TCP New RenoIRJET- Simulation Analysis of a New Startup Algorithm for TCP New Reno
IRJET- Simulation Analysis of a New Startup Algorithm for TCP New Reno
 
IRJET- Comparative Study of Reactive Routing Protocols in MANET: A Review
IRJET- Comparative Study of Reactive Routing Protocols in MANET: A ReviewIRJET- Comparative Study of Reactive Routing Protocols in MANET: A Review
IRJET- Comparative Study of Reactive Routing Protocols in MANET: A Review
 
Improving the selection of MPRs in OLSR protocol: a survey of methods and tec...
Improving the selection of MPRs in OLSR protocol: a survey of methods and tec...Improving the selection of MPRs in OLSR protocol: a survey of methods and tec...
Improving the selection of MPRs in OLSR protocol: a survey of methods and tec...
 
Travel demand matrix estimation methods integrating the full richness of obse...
Travel demand matrix estimation methods integrating the full richness of obse...Travel demand matrix estimation methods integrating the full richness of obse...
Travel demand matrix estimation methods integrating the full richness of obse...
 
The UCLouvain Public Defense of my EMJD-DC Double Doctorate Ph.D. degree
The UCLouvain Public Defense of my EMJD-DC Double Doctorate Ph.D. degreeThe UCLouvain Public Defense of my EMJD-DC Double Doctorate Ph.D. degree
The UCLouvain Public Defense of my EMJD-DC Double Doctorate Ph.D. degree
 

Mais de Shahneel Siddiqui (10)

Comparison of Wifi, Lifi and Gifi
Comparison of Wifi, Lifi and GifiComparison of Wifi, Lifi and Gifi
Comparison of Wifi, Lifi and Gifi
 
Information Centric Networking
Information Centric NetworkingInformation Centric Networking
Information Centric Networking
 
Development of DNS
Development of DNSDevelopment of DNS
Development of DNS
 
The accounting cycle
The accounting cycleThe accounting cycle
The accounting cycle
 
SCR protections
SCR protectionsSCR protections
SCR protections
 
Rewirable Fuses
Rewirable FusesRewirable Fuses
Rewirable Fuses
 
Quine Mc Cluskey Method
Quine Mc Cluskey MethodQuine Mc Cluskey Method
Quine Mc Cluskey Method
 
Multiple input & Multiple Output Systems
Multiple input & Multiple Output SystemsMultiple input & Multiple Output Systems
Multiple input & Multiple Output Systems
 
Laser diodes
Laser diodesLaser diodes
Laser diodes
 
Internet of things
Internet of thingsInternet of things
Internet of things
 

Último

UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
rknatarajan
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
Tonystark477637
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
dollysharma2066
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
ankushspencer015
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Christo Ananth
 

Último (20)

Vivazz, Mieres Social Housing Design Spain
Vivazz, Mieres Social Housing Design SpainVivazz, Mieres Social Housing Design Spain
Vivazz, Mieres Social Housing Design Spain
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
NFPA 5000 2024 standard .
NFPA 5000 2024 standard                                  .NFPA 5000 2024 standard                                  .
NFPA 5000 2024 standard .
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLPVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 

Congestion Control in NDN

  • 2. Presentation Outline ▪ Brief Introduction on NDN ▪ NDN Performance Analysis ▪ Overload Characteristics of NDN Network ▪ Performance Deterioration Mechanism ▪ Congestion Control Methods ▪ Method 1: Caching Control ▪ Method 2: Interest Forwarding Control ▪ Evaluation of Caching Control ▪ Evaluation of Forwarding Control ▪ Conclusions 2/28
  • 3. Brief Introduction on NDN ▪ NDN uses two types of packets: Interest & Data ▪ Each NDN router maintains three kind of tables ▪ Content Store (CS), ▪ Pending Interest Table (PIT) ▪ Forwarding Information Base (FIB). ▪ The CS caches received Data Packet temporarily ▪ The PIT records an Interest Packet that has been forwarded, waiting for the Data Packet to return ▪ The FIB corresponds to the routing table in IP network except that it contains data name instead of IP address. 3/28
  • 4. NDN Performance Analysis ▪ The simulations are ran by changing the number of users from 1600 to 2000 ▪ Each user generates the content request with the same rate, so the number of content requests is proportional to the number of users ▪ NDN is expected to achieve more efficient content delivery owing to in-network caching than IP network ▪ However, the router cache size is limited. It is assumed that every router has the cache capacity that is 5% of the total amount of contents 4/28
  • 5. Overload Characteristics of NDN Network ▪ The figure below shows the average value of the maximum content acquisition time for each user as well as the number of request retransmission ▪ It can be seen that both of the content acquisition time and the number of re-request are extended with increase in the number of users ▪ The timeout period for the user to retransmit the Interest was assumed to 5 seconds. 5/28
  • 6. Overload Characteristics of NDN Network (Continued) ▪ To explain the simulation results, the notations are as shown below ▪ The router RA and router RB are connected by a bidirectional link. ▪ The link from RA to RB is LA,B and its usage rate is ρ (LA, B) ▪ Similarly, the link from RB to RA is LB,A and its usage rate is ρ (LB, A) ▪ If the utilization of a given link exceeds the threshold level (say, 80%), the link is referred to a congestion link 6/28
  • 7. Overload Characteristics of NDN Network (Continued) ▪ For link utilization, when the number of users was 2000, the congestion links were L34,0, L35,2, L36,2 and L2,4 ▪ The time variation of the congested link utilization is shown in Figure ▪ As the number of users increases, the link utilization also increases. 7/28
  • 8. Overload Characteristics of NDN Network (Continued) ▪ Particularly, utilization of L2,4 remained at almost 100% during the simulation period. ▪ Due to the limited router cache capacity, content that does not fit in the cache will be cached in the upstream router along the path. ▪ As a result, the utilization of the upstream link gradually rises. ▪ Link congestion is considered to be generated in this way. 8/28
  • 9. Overload Characteristics of NDN Network (Continued) ▪ The router whose incoming link is congested (e.g., Router RA with congestion link LB,A) ▪ Routers corresponding to this condition were R0, R2 and R4 ▪ For router RA the cache hit rate of interest packets towards the link LA,B was measured ▪ It can be seen that the cache hit rate is reduced as the number of user increases 9/28
  • 10. Performance Deterioration Mechanism ▪ It can be assumed that the performance deterioration of NDN occurs in the following mechanism as shown 1. When so many content requests occur, Interests may concentrate on specific routers within a network. 2. At the router RD where Interests are concentrated, a large amount of Data corresponding to the Interests are returned and cached. When the cache is full, the cache replacement occurs frequently and cache hit rate decreases. 10/28
  • 11. Performance Deterioration Mechanism (Continued) ▪ It can be assumed that the performance deterioration of NDN occurs in the following mechanism as shown 3. By a decrease in cache hit rate, many Interests are forwarded to the outgoing link LD,U 4. In response to these Interests, a large amount of Data flows into the incoming link LU,D 5. When the link LU, D becomes congested, Data Packets are dropped. 11/28
  • 12. Performance Deterioration Mechanism (Continued) ▪ It can be assumed that the performance deterioration of NDN occurs in the following mechanism as shown 6. Then timeout occurs on the user side, and the user retransmits the Interest to the network. 7. The user repeats re-request until the acquisition of the desired data. 12/28
  • 13. Congestion Control Methods ▪ Method 1: Caching Control ▪ In the case when the link LU,D is congested, if Data from LU,D can be cached in higher priority at the router RD, the future Interests would not be forwarded to LD,U ▪ This improves that the cache hit rate of the Interests towards LD,U and mitigates the congestion of link LD,U ▪ Method 2: Interest forwarding control ▪ When the router RD detects congestion at the incoming link LU,D, it redirects the Interest to other interface than that of LD,U. ▪ By doing so, the congestion of link LU,D would be mitigated 13/28
  • 14. Method 1: Caching Control ▪ The objective of this method is to improve the cache hit rate of the Interest toward the interface whose incoming link is congested ▪ For this purpose, we modify the LRU (least recently used) data, that is the default caching policy of NDN ▪ In the case where the router RD has received a Data Packet and the cache of router RD is full, then 1. When the incoming link utilization ρ (LU, D) is less than the threshold (80%), the router RD applies the normal LRU. 2. When the incoming link utilization ρ (LU, D) is not less than the threshold value (80%), the router RD searches for the LRU data and examines whether it has been received from the congestion link LU, D. If so, the router RD searches for the next LRU data. 14/28
  • 15. Method 2: Interest Forwarding Control ▪ The objective of this method is to reduce the usage rate of the congestion links ▪ For this purpose, each router detects congestion in its incoming links and if it detects congestion, it does not forward the Interest to that interface and searches for alternate paths ▪ The alternate path should be short and loop-free. For this purpose, Method 2 uses the number of hops to the Publisher at each router 15/28
  • 16. Method 2: Interest Forwarding Control (Continued) ▪ In Method 2, the path (or interface) selection for interest forwarding is achieved in two phases, namely 1. Candidate Interface Selection 2. Forwarding Interface Selection 17/28
  • 17. Candidate Interface Selection Phase ▪ The router selects candidate interface(s) for Interest forwarding based on the following conditions 1. The interface whose incoming link utilization is less than the threshold (80%). 2. The interface having the minimum hop to the publisher ▪ In the following example, since the F1 is excluded by the condition 1, the candidate interface becomes the F2 and F3 18/28
  • 18. Forwarding Interface Selection Phase ▪ Depending on the number of candidate interface N, the forwarding interface is selected as follows. ▪ The interface having the minimum hop to the publisher among the candidate interfaces. ▪ If there are more than two interfaces having the minimum hop, the interface whose incoming link utilization is the lowest is selected 19/28
  • 19. EVALUATION OF PROPOSED CONTROLS 20/28
  • 20. ▪ First, with no control, the link utilization in the network is measured. ▪ Congestion appeared at links L35,2, L36,2, and L2,4 whose locations in the network are shown Evaluation of Caching Control 21/28
  • 21. ▪ Maximum Content Acquisition Time ▪ By control, the content acquisition time was reduced by 20.74% in maximum (trial 4) and 16.1% in average Evaluation of Caching Control (Continued) 22/28
  • 22. ▪ Congestion Link Utilization ▪ We can see that our control mitigates the congestion of L36,2 and L35,2 by 9.3% and 7.2% respectively ▪ Meanwhile in the link L2,4, the utilization had reached 100% even under control. Evaluation of Caching Control (Continued) 23/28
  • 23. ▪ Cache Hit Rate ▪ In the router R4, significant improvement in cache hit rate can be seen. ▪ But opposite effect was observed in R2 ▪ Because the R2 was adjacent to two congestion links (L35,2 and L36,2), Evaluation of Caching Control (Continued) 24/28
  • 24. Evaluation of Forwarding Control ▪ Maximum Content Acquisition Time ▪ By control, the content acquisition time was reduced by 30.1% in maximum (trial 4) and 24.2% in average 25/28
  • 25. ▪ Congestion Link Utilization ▪ Without control the utilization of the congestion links has remained around 80%. ▪ With control, it was improved by from 94.6% to 85.3%. Evaluation of Forwarding Control (Continued) 26/28
  • 26. Conclusions ▪ By these controls discussed earlier, link congestion was mitigated and content acquisition time was significantly improved ▪ Caching control helps mitigates link congestion indirectly by caching the data packet coming from congested link thus decreasing the interest packets that are forwarded to the outgoing link of the interface ▪ Forwarding control contributes more directly in decreasing the interest packets by redirecting them to other interfaces. ▪ Forwarding Control found to be more effective because caching control was only effective when the router is connected to a single congestion link 27/28
  • 27. Thank You Questions and Suggestions are welcomed !