Beruflich Dokumente
Kultur Dokumente
art ic l e i nf o
a b s t r a c t
Article history:
Received 28 August 2014
Received in revised form
4 May 2015
Accepted 23 June 2015
Available online 10 July 2015
Information-centric networking (ICN) promises to overcome the networking challenges of the current
Internet, e.g. the explosion of content consumption and the widening gap between trafc and capacity
growth, by decoupling the content from the network locations. Simultaneously, the dominant mode of
content access in Internet is materializing as IP-based broadband wireless networks with advanced user
devices and ubiquitous mobile systems. Current caching-based solutions largely focus on improving the
efciency of content delivery while mostly overlooking energy efciency aspects. However, the
expanding networking infrastructure is expected to be more energy-efcient conforming to green
communications concept while serving burgeoning trafc demands. Motivated by this concern, we
study caching at the edge of an infrastructure-based mobile network supporting ICN with a focus on
energy consumption of the considered system. We devise a greedy heuristic for cache management
which incorporates energy reward, popularity, Time-To-Live (TTL) and delay (i.e. chunk loss due to delay
sensitivity) factors. Our numerical analysis proves the energy savings achieved by the proposed greedy
approach with low-complexity operation.
& 2015 Elsevier Ltd. All rights reserved.
Keywords:
Energy efciency
Network caching
Information-centric networking
Wireless content delivery
1. Introduction
The Internet usage has drastically evolved from a point-topoint communication and exchange paradigm to a content dissemination and retrieval context. This circumstance has necessitated a more content-centric rather than a host-centric design.
Information-centric networking (ICN) builds on this premise to
overcome the shortcomings of address based routing/operation in
the emerging era of pervasive and ubiquitous networking. ICN
identies content rather than network locations enabling the
addressing schemes facilitated by application-level/social considerations. The incumbent design factor of resource sharing for the
conventional IP is translated to a requirement for more serviceand content-oriented operation (Carzaniga et al., 2011).
Another emerging condition is the mobile broadband explosion
propelled with new services and content available anytimeanywhere. Hence, the upcoming broadband wireless standards
are putting a bigger burden on mobile networks for serving the
Internet trafc surge. Moreover, this diverse range of services and
modalities bring forth new players and factors such as OTT (OverThe-Top) service providers (e.g. Netix, Skype and YouTube) and
P2P (Peer-to-Peer)-based content sharing, which heavily tax
34
application-layer solutions, namely CDNs (Content Delivery Networks), P2P overlays and HTTP proxies, have already been
deployed through the current Internet ecosystem, more substantial architectural changes are evident. For instance, CDNs are
generally effective in shortening transport paths resulting in
smaller delays and better throughput (Hasslinger and Hohlfeld,
2010). However, the deployment cost of CDNs and scalability
issues are also prevalent (Pallis and Vakali, 2006). Therefore,
research projects such as SAIL, PSIRP, COMET and 4WARD have
proposed various networking models to realize Future Internet
concept (Muscariello et al., 2011). ICN has been an active eld in
that regard with related efforts and proposals such as Data
Oriented Network Architecture (DONA), Content-Centric Networking (CCN), and Publish/Subscribe Internet (PURSUIT) (Alzahrani
et al., 2015).
An example ICN network is shown in Fig. 1. The ICN approach
implies context resolution/service resolution instead of machine
resolution (Psaras et al., 2011). Receiver-driven model and caching
are two salient features of ICN. Clearly, this approach benets the
delivery of popular content (e.g. reduced delivery delay) and
alleviates resource requirements (e.g. bandwidth and server load)
in the network (Choi et al., 2011). Thus, the loose coupling
between content and its originator provides opportunities to
facilitate mechanisms for many of the prevalent issues with the
current network architecture such as multicast, multipath routing
and mobility (Jacobson et al., 2009). However, there are also
substantial obstacles such as security and object naming/identication against ICN proliferation. Simply, the content has to be
secure with proper condentiality and credentials while being
uniquely identiable among a huge number of objects present in
the network. Moreover, deployment of caches and in-network
storage at different points in the interconnection, backbone and
aggregation levels of a network is critical to improve the system
performance for content consumption (Xu et al., 2014). According
to Hasslinger and Hohlfeld (2010), main trends and forecasts
regarding the Internet trafc envisage the doubling of global IP
trafc through 2013 with video becoming the major source of
trafc (video trafc will account more than 90% of consumer trafc
FIB
AS
AS
cache
CCN router
site1.com
CCN server
cache
AS
chunks
CCN router
site2.com
AS
site3.com
EDGE
CORE
Fig. 1. An ICN example considered in CCN (Content-Centric Networking) proposal (AS, autonomous system; FIB, forwarding information base).
Network
segment in
focus
pij
UE0
<ail,bil>
Aggregation layer
AP0
(eNB0)
CAC0
EDGE ROUTER
(MME/S-GW0)
CAS1
Core layer
35
Backbone
layer
CORE ROUTER
(CR1)
BACKBONE
ROUTER (CB1)
CAR1
CBR1
<ci,di>
UNIVERSAL
SOURCE
fetch content
UEL
APN
(eNBN)
EDGE ROUTER
(MME/S-GWN)
CACN
Other ASs
CORE ROUTER
(CRN)
BACKBONE
ROUTER (CBN)
CARN
CBRN
CASN
Fig. 2. The investigated network setup for ICN in wireless network. The network nodes employ caches (CXYi's) enabling in-network storage. The node instances closer to the
edge follow the LTE terminology (provided in parentheses) but can be any wireless cellular broadband technology with assumed capabilities.
3. Related work
Content cache management has been an important topic
especially for ad hoc networks (Yin and Cao, 2006). For instance,
a cooperative cache-based content dissemination framework to
carry out the cooperative soliciting and caching strategies for two
encountering nodes in a mobile ad hoc networks is proposed in
Ma and Jamalipour (2010). In Fiore et al. (2011), Fiore et al. focus
on diverse cache features, specically different cache sizes, and
design a content replacement strategy for intermittent and peerto-peer information exchange.
Information dissemination has been under focus especially for
wireless sensor networks. Dimokas et al. present a cooperative
caching solution particularly suitable for wireless multimedia
sensor networks (WMSNs) in Dimokas et al. (2008). The proposed
caching solution exploits sensor nodes which reside in positions of
the network that allow them to forward packets or communicate
decisions within short latency. In Hoeller (2010), optimizations for
processing queries by using adaptive caching structures in WSN
are discussed and an approximative update policy is presented. In
the wired domain, CDNs have been a driving factor to utilize
caching for content delivery. CDNs are characterized by robustness
in serving huge amounts of requests and content volumes (Stamos
et al., 2008). Caching can be managed using various mechanisms
in CDNs. In Chen et al. (2002), Chen et al. use an application level
multicast tree as a cache replacement policy for each CDN
36
4. System model
In this section, we layout the system model analytically and
setup the optimization problem for cache management from the
perspective mentioned above. The system parameters and relevant notation are shown in Table 1. Throughout the paper, we may
restate the denitions for the sake of clarity.
The network setup is shown in Fig. 2. The wireless network has an
access segment with an aggregation stage and a core part interconnected to other IP networks through a backbone network. For the sake
of simplicity, Universal Source is a logical shorthand representation
for chunk stores/servers in the rest of Internet. As noted in Section 2,
we focus on the access segment of the wireless network. There are L
UEs consuming content represented as chunks oj of size soj through N
APs in the system. These distinct objects constitute the global set of
chunks I. Each APi has a local cache with size Mi containing the set of
cached chunks Ci. During content consumption, a chunk not present in
the local caches is fetched from the universal source with an average
hop-count Nfbr;cr;erg and energy cost per hop efbr;cr;erg through the
network segments resulting in eik
tr. This is a prudent assumption since
we do not distinguish among the chunks in the system according to
their locations in the network or their respective stores. For an energyaware/-efcient cache management scheme, the network nodes
should be aware of transport cost among themselves. This is feasible
via information sharing due to relatively static nature of the
Table 1
System parameters.
Parameter Explanation
oj
so j
N
Mi
Ci
A distinct chunk, oj A I, j 1; ; I
The size of chunk oj, so j A S, set of chunk sizes
The number of access points (APi) operating in the zone
The cache size of APi
P
The set of cached chunks in APi,
soj A C i r M i
I
L
pij
dij
eik
g
eic
eilf
eik
req
eik
tr
eipr
bi
C
hi
N fbr;cr;erg
efbr;cr;erg
We do not make any assumptions on specic naming or contentbased routing mechanisms employed in ICN (Jacobson et al.,
2009). We assume necessary mechanisms such as FIB caching
and hierarchical deployment are already employed in the routing
nodes. Moreover, the Zipf-nature of the Web content consumption
implies that for a relatively small period of time, a limited set of
ICN is utilized by an FIB to forward ows of interest messages
(Blefari-Melazzi et al., 2012), which helps the scalability issue.
As noted in Section 2, we do not consider the caching at the
wireless user nodes, rather focus on the network-centric optimization in the infrastructure-based wireless network, especially
next-generation wireless networks such as LTE Advanced. The
main reason is the emerging capability due to the standardization
of wireless access points acting as IP routers for these systems.
Figure 2 provides LTE naming of nodes in addition to general node
types such as core router for exemplifying the mapping for a nextgeneration wireless system.
We assume that the cache operates in a weakly consistent
manner, i.e. the applications can be served stale data from the
cache occasionally (Lin and Chang, 2002; Shim et al., 1999). The
consistency mechanism employs Time-To-Live (TTL) monitoring in
order to invalidate stale chunks in the cache.
4.2. Energy consumption model and reward structure
We focus on a single of AP, namely AP0, in a so-called cache zone
for optimization purposes. Therefore, we can drop the indice i
identifying the specic AP. The energy consumption for content oj
access at APi, Eij, is composed of three main components, namely
ec, ef and eg
(
ec oj ef oj if dij 0
1
E0j Ej
ef oj eg oj otherwise
where ec is the cost of caching and locally serving the chunk, ef is
the energy cost for wireless transmission of the chunk from AP0 to
the requester user equipment and eg is the energy cost of fetching
the chunk from other caches or the source. The quantity ec oj is
equal to soj ec while ef oj is a function of wireless transmission
power, transceiver circuitry consumption and channel conditions
between AP and UE. The last quantity eg oj in (1) is written as
eg oj ereq oj etr oj epr oj
Absolute
consumption
(W/Gbps)
Normalized
consumption
(unit energy per unit data)
Hop
count
Backbone router
Core router
Edge router
15
28.6
80
1
1.9
5.3
5
6
1
37
j Ij
X
pj Ej
j1
where
Elocalaccess sox ec
and
Epull eg ox
oj 2
=b
C
oj A C
subject to
soj 1h
oj A C
j A f1; 2; ; Ig:
oj 2
=b
C
i r M so ;
k
9b
co
la
rre
Chunk Size
te
d
Popularity
Maximize the
reward.
Caching
Heuristic
Prefer smaller
chunks.
Chunk Validity
(TTL)
Energy reward: This is the main factor, for which fx aims to opt
for chunks with higher values.
exploitation of statistical nature of chunk requests. An important aspect related to popularity is the issue of one-timers
which are objects requested only once and may pollute the
cache, and decrease the hit performance of the caching
mechanisms (Mahanti et al., 2000). This phenomenon becomes
more apparent when cache capacity or processing restrictions
are in force (Ioannou and Weber, 2014). Over a long time
horizon, the access pattern is expected to have a stable
statistical nature where one-timers are transient agents. However, cache pollution is an important issue for highly dynamic
environments.
Delay sensitivity: Preferring delay sensitive chunks alleviates
energy consumption with retransmissions due to latency. For
caching related literature focusing solely on the edge, that
factor is not rather apparent. However, when an infrastructurebased wireless network with an end-to-end chunk transmission is considered, it becomes more important. This quantity is
Delay Sensitivity
(fx)
(c
co hu C
m nk or
pl v re
ia al la
nc id te
i
lim e to ty r d
its te equ
.) m ir
po es
ra
l
38
10
chunk
requested
No
Yes
fetch the content
pj
j
12
is cache full?
Yes
No
where
0
11
N
X
1
A :
@
j
j1
Run ENACI
benefit
calculations.
Place in the
cache
Replace the selected
incumbent chunk (s).
rewardj TTLj
j
sj
TTLmax
11
0.25
=0.3
=0.7
=1
0.2
0.15
0.1
13
p (probability of request)
ENACI
is chunk available
in the cache?
39
0.05
5. Numerical evaluation
For performance evaluation, the chunk popularity is modeled
as a cut-off Zipf distribution (Breslau et al., 1999). In other words,
we assume that the relative frequency with which the chunks are
accessed follows a generalization of Zipf's law which is widely
10
15
20
25
30
35
40
40
Table 3
Simulation parameters.
Parameter Value
M
jIj
TTL
K
S
ec
ef
ereq
epr
N fbr;cr;erg
efbr;cr;erg
42
700
500
2
{6}, {4, 6, 8}, {3, 6, 9}, {1, 2, 6, 10, 11},{1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11}
{0.1, 0.2, 0.3, 0.5, 0.7, 1, 1.2, 1.4}
{35, 45, 50, 55, 60}
2
4
1
10
9
{5, 6, 1}
{16, 32, 85}
3000
1500
Fig. 7. Effect of size composition on the average energy consumption per object
query 0:9; M 42; so 6.
2600
2400
2200
2000
1800
1600
1000
2000
2800
1200
2500
1000
3000
1400
BASE
LRU
ENACI
NONE
3000
Average energy consumption per query
LRU
BASE
ENACI
NONE
0.5
0.7
value
1.2
1.4
2500
2000
1500
BASE
LRU
ENACI
NONE
1000
0 0.5 1
Fig. 6. Performance comparison of caching mechanisms for different values and cache sizes. (a) Effect of on the average energy consumption per object query. (b) Effect of
cache size M on the average energy consumption per object query ( 1).
0.4
0.2
0
0.1/0.3
0.75
BASE
0.5
LRU
ENACI
NONE
0.5
BASE
LRU
0.25
ENACI
0.25
NONE
BASE
LRU
ENACI
0.6
41
0
0
0.1
0.2 0.3
0.5
0.7
1.2
1.4
{e/c } pairs
Fig. 8. Network trafc volume and cache hit ratio for varying and (a) For different values ( 0.9) and (b) For different values ({e,c} {0.1, 0.2}).
L s o N e e N c N e c Nb N c N e 1 e c
14
6. Conclusions
L N b N c 1 e N b c N e
15
In this work, we have discussed and evaluated cache replacement policies for information-centric operation at the edge of
infrastructure based wireless networks. We have focused on the
objective of EE. ICN provides new degrees of freedom for CSPs to
meet mobile broadband requirements. Moreover, the increasing
content-centric access over wireless networks poses ICN-based
approaches more attractive. In that regard, caching and innetwork storage is a crucial constituent of this paradigm. In our
study, we investigate the utilization of caches in the wireless
access nodes for increasing performance in terms of EE. The
exible setup of edge caching to facilitate multimode networking
(conventional or content-centric) is benecial for EE. The proposed
greedy heuristic ENACI algorithm provides an energy-efcient
cache replacement scheme with relatively low complexity for
ICN based wireless access networks. As future work, we plan to
include a more elaborate energy consumption model for remote
retrieval of content from the providers in the Internet. More
advanced popularity estimation schemes considering spatiotemporal characteristics provide another research direction. Another
potential topic is the analysis for cooperative AP caching
embedded in a more realistic incumbent caching infrastructure.
References
Alzahrani BA, Reed MJ, Riihirvi J, Vassilakis VG. Scalability of information centric
networking using mediated topology management. J Netw Comput Appl
2015;50:12633.
Bartolini N, Lo Presti F, Petrioli C. Optimal dynamic replica placement in content
delivery networks. In: The 11th IEEE international conference on networks,
2003. ICON2003; 2003. p. 12530.
Blefari-Melazzi N, Detti A, Morabito G, Salsano S, Veltri L. Supporting informationcentric functionality in software dened networks. In: Proceedings of the IEEE
ICCworkshop on SDN; 2012.
42