-
Partial Information Decomposition for Data Interpretability and Feature Selection
Authors:
Charles Westphal,
Stephen Hailes,
Mirco Musolesi
Abstract:
In this paper, we introduce Partial Information Decomposition of Features (PIDF), a new paradigm for simultaneous data interpretability and feature selection. Contrary to traditional methods that assign a single importance value, our approach is based on three metrics per feature: the mutual information shared with the target variable, the feature's contribution to synergistic information, and the…
▽ More
In this paper, we introduce Partial Information Decomposition of Features (PIDF), a new paradigm for simultaneous data interpretability and feature selection. Contrary to traditional methods that assign a single importance value, our approach is based on three metrics per feature: the mutual information shared with the target variable, the feature's contribution to synergistic information, and the amount of this information that is redundant. In particular, we develop a novel procedure based on these three metrics, which reveals not only how features are correlated with the target but also the additional and overlap** information provided by considering them in combination with other features. We extensively evaluate PIDF using both synthetic and real-world data, demonstrating its potential applications and effectiveness, by considering case studies from genetics and neuroscience.
△ Less
Submitted 7 June, 2024; v1 submitted 29 May, 2024;
originally announced May 2024.
-
Towards a Dynamic Future with Adaptable Computing and Network Convergence (ACNC)
Authors:
Masoud Shokrnezhad,
Hao Yu,
Tarik Taleb,
Richard Li,
Kyunghan Lee,
Jaeseung Song,
Cedric Westphal
Abstract:
In the context of advancing 6G, a substantial paradigm shift is anticipated, highlighting comprehensive everything-to-everything interactions characterized by numerous connections and stringent adherence to Quality of Service/Experience (QoS/E) prerequisites. The imminent challenge stems from resource scarcity, prompting a deliberate transition to Computing-Network Convergence (CNC) as an auspicio…
▽ More
In the context of advancing 6G, a substantial paradigm shift is anticipated, highlighting comprehensive everything-to-everything interactions characterized by numerous connections and stringent adherence to Quality of Service/Experience (QoS/E) prerequisites. The imminent challenge stems from resource scarcity, prompting a deliberate transition to Computing-Network Convergence (CNC) as an auspicious approach for joint resource orchestration. While CNC-based mechanisms have garnered attention, their effectiveness in realizing future services, particularly in use cases like the Metaverse, may encounter limitations due to the continually changing nature of users, services, and resources. Hence, this paper presents the concept of Adaptable CNC (ACNC) as an autonomous Machine Learning (ML)-aided mechanism crafted for the joint orchestration of computing and network resources, catering to dynamic and voluminous user requests with stringent requirements. ACNC encompasses two primary functionalities: state recognition and context detection. Given the intricate nature of the user-service-computing-network space, the paper employs dimension reduction to generate live, holistic, abstract system states in a hierarchical structure. To address the challenges posed by dynamic changes, Continual Learning (CL) is employed, classifying the system state into contexts controlled by dedicated ML agents, enabling them to operate efficiently. These two functionalities are intricately linked within a closed loop overseen by the End-to-End (E2E) orchestrator to allocate resources. The paper introduces the components of ACNC, proposes a Metaverse scenario to exemplify ACNC's role in resource provisioning with Segment Routing v6 (SRv6), outlines ACNC's workflow, details a numerical analysis for efficiency assessment, and concludes with discussions on relevant challenges and potential avenues for future research.
△ Less
Submitted 12 March, 2024;
originally announced March 2024.
-
Information-Theoretic State Variable Selection for Reinforcement Learning
Authors:
Charles Westphal,
Stephen Hailes,
Mirco Musolesi
Abstract:
Identifying the most suitable variables to represent the state is a fundamental challenge in Reinforcement Learning (RL). These variables must efficiently capture the information necessary for making optimal decisions. In order to address this problem, in this paper, we introduce the Transfer Entropy Redundancy Criterion (TERC), an information-theoretic criterion, which determines if there is \tex…
▽ More
Identifying the most suitable variables to represent the state is a fundamental challenge in Reinforcement Learning (RL). These variables must efficiently capture the information necessary for making optimal decisions. In order to address this problem, in this paper, we introduce the Transfer Entropy Redundancy Criterion (TERC), an information-theoretic criterion, which determines if there is \textit{entropy transferred} from state variables to actions during training. We define an algorithm based on TERC that provably excludes variables from the state that have no effect on the final performance of the agent, resulting in more sample efficient learning. Experimental results show that this speed-up is present across three different algorithm classes (represented by tabular Q-learning, Actor-Critic, and Proximal Policy Optimization (PPO)) in a variety of environments. Furthermore, to highlight the differences between the proposed methodology and the current state-of-the-art feature selection approaches, we present a series of controlled experiments on synthetic data, before generalizing to real-world decision-making tasks. We also introduce a representation of the problem that compactly captures the transfer of information from state variables to actions as Bayesian networks.
△ Less
Submitted 21 January, 2024;
originally announced January 2024.
-
Networking for the Metaverse: The Standardization Landscape
Authors:
Cedric Westphal,
Jungha Hong,
Shin-Gak Kang,
Leonardo Chiariglione,
Tianji Jiang
Abstract:
New applications are being supported by current and future networks. In particular, it is expected that Metaverse applications will be deployed in the near future, as 5G and 6G network provide sufficient bandwidth and sufficiently low latency to provide a satisfying end-user experience. However, networks still need to evolve to better support this type of application. We present here a basic taxon…
▽ More
New applications are being supported by current and future networks. In particular, it is expected that Metaverse applications will be deployed in the near future, as 5G and 6G network provide sufficient bandwidth and sufficiently low latency to provide a satisfying end-user experience. However, networks still need to evolve to better support this type of application. We present here a basic taxonomy of the metaverse, which allows to identify some of the networking requirements for such an application; we also provide an overview of the current state of balthe standardization efforts in different standardization organizations, including ITU-T, 3GPP, IETF and MPAI.
△ Less
Submitted 14 December, 2023;
originally announced December 2023.
-
LEO Satellite Networking Relaunched: Survey and Current Research Challenges
Authors:
Cedric Westphal,
Lin Han,
Richard Li
Abstract:
This document surveys recent and current developments in LEO satellite networking. It presents a brief overview of satellite networking in order to contextualize the issue. It then focuses on current research work in emerging domains, such as Machine Learning, SDN, low latency networking, green networking, Information-Centric Networks, etc. For each, it presents recent works and a direction of the…
▽ More
This document surveys recent and current developments in LEO satellite networking. It presents a brief overview of satellite networking in order to contextualize the issue. It then focuses on current research work in emerging domains, such as Machine Learning, SDN, low latency networking, green networking, Information-Centric Networks, etc. For each, it presents recent works and a direction of the research community within that emerging domain.
The paper also describes the current state of standardization efforts in 3GPP and in IETF for LEO satellite networking. In particular, we present in some detail the direction these standards body are pointing towards for LEO networking with inter-satellites links. Finally, some future challenges and interesting research directions are described and motivated. This is an overview of the current state of the LEO satellite research in both academic and industrial standardization environments which we believe will be helpful to understand the current state of the art.
△ Less
Submitted 11 October, 2023;
originally announced October 2023.
-
Optimization Framework for Green Networking
Authors:
Cedric Westphal,
Alexander Clemm
Abstract:
Reducing energy consumption - and especially carbon emissions - is one of the most important challenges facing humankind. ICT (Information and Communication Technology) is a powerful tool to reduce emissions as it offers alternatives to activities that are costly in energy: video streaming saves energy vs driving to a movie theater, for instance. Still, the carbon footprint of ICT in general and n…
▽ More
Reducing energy consumption - and especially carbon emissions - is one of the most important challenges facing humankind. ICT (Information and Communication Technology) is a powerful tool to reduce emissions as it offers alternatives to activities that are costly in energy: video streaming saves energy vs driving to a movie theater, for instance. Still, the carbon footprint of ICT in general and networking in particular have been growing, despite better energy efficiency per transmitted bit, due to the sheer growth in Internet usage and traffic.
The information and communication technology (ICT) sector is currently estimated to create 2.7% of all global CO2 emissions and expected to continue to increase. Hence, monitoring and reducing the CO2 emissions from ICT is increasingly important. Networks are responsible for around 13% of ICT energy consumption, a third of which in turn is attributable to backbone (core) networks. As such, it is important to offer new mechanisms to reduce the energy footprint of networks.
In this paper, we present a framework to include energy considerations (as a proxy for carbon footprint) into the management plane of a network. We apply this framework to optimize the network topology so as to minimize the energy spending while at the same time providing a satisfactory Quality of Experience (QoE) to the end users. We present this framework along high-level considerations, as its deployment and evaluation is left for future work.
△ Less
Submitted 20 March, 2023;
originally announced March 2023.
-
Trends, Opportunities, and Challenges in Using Restricted Device Authentication in Fog Computing
Authors:
Wesley dos Reis Bezerra,
Carlos Becker Westphal
Abstract:
The few resources available on devices restricted in Internet of Things are an important issue when we think about security. In this perspective, our work proposes a agile systematic review literature on works involving the Internet of Things, authentication, and Fog Computing. As a result, related works, opportunities, and challenges found at these areas' intersections were brought, supporting ot…
▽ More
The few resources available on devices restricted in Internet of Things are an important issue when we think about security. In this perspective, our work proposes a agile systematic review literature on works involving the Internet of Things, authentication, and Fog Computing. As a result, related works, opportunities, and challenges found at these areas' intersections were brought, supporting other researchers and developers who work in these areas.
△ Less
Submitted 29 September, 2022; v1 submitted 26 September, 2022;
originally announced September 2022.
-
Reversing The Meaning of Node Connectivity for Content Placement in Networks of Caches
Authors:
Junaid Ahmed Khan,
Cedric Westphal,
J. J. Garcia-Luna-Aceves,
Yacine Ghamri-Doudane
Abstract:
It is a widely accepted heuristic in content caching to place the most popular content at the nodes that are the best connected. The other common heuristic is somewhat contradictory, as it places the most popular content at the edge, at the caching nodes nearest the users. We contend that neither policy is best suited for caching content in a network and propose a simple alternative that places th…
▽ More
It is a widely accepted heuristic in content caching to place the most popular content at the nodes that are the best connected. The other common heuristic is somewhat contradictory, as it places the most popular content at the edge, at the caching nodes nearest the users. We contend that neither policy is best suited for caching content in a network and propose a simple alternative that places the most popular content at the least connected node. Namely, we populate content first at the nodes that have the lowest graph centrality over the network topology. Here, we provide an analytical study of this policy over some simple topologies that are tractable, namely regular grids and trees. Our mathematical results demonstrate that placing popular content at the least connected nodes outperforms the aforementioned alternatives in typical conditions.
△ Less
Submitted 12 November, 2019;
originally announced November 2019.
-
A Framework for Qualitative Communications Using Big Packet Protocol
Authors:
Richard Li,
Kiran Makhijani,
Hamed Yousefi,
Cedric Westphal,
Lijun Dong,
Tim Wauters,
Filip De Turck
Abstract:
In the current Internet architecture, a packet is a minimal or fundamental unit upon which different actions such as classification,forwarding, or discarding are performed by the network nodes.When faced with constrained or poor network conditions, a packet is subjected to undesirable drops and re-transmissions, resulting in unpredictable delays and subsequent traffic overheads in the network. Alt…
▽ More
In the current Internet architecture, a packet is a minimal or fundamental unit upon which different actions such as classification,forwarding, or discarding are performed by the network nodes.When faced with constrained or poor network conditions, a packet is subjected to undesirable drops and re-transmissions, resulting in unpredictable delays and subsequent traffic overheads in the network. Alternately, we introduce qualitative communication services which allow partial, yet timely, delivery of a packet instead of drop** it entirely. These services allow breaking down packet payloads into smaller units (called chunks), enabling much finer granularity of bandwidth utilization.
We propose Packet Wash as a new operation in forwarding nodes to support qualitative services. Upon packet error or network congestion, the forwarding node selectively removes some chunk(s)from the payload based on the relationship among the chunks or the individual significance level of each chunk. We also present a qualitative communication framework as well as a Packet Wash directive implemented in a newly evolved data plane technology,called Big Packet Protocol (BPP)
△ Less
Submitted 25 June, 2019;
originally announced June 2019.
-
Offloading Content with Self-organizing Mobile Fogs
Authors:
Junaid Ahmed Khan,
Cedric Westphal,
Yacine Ghamri-Doudane
Abstract:
Mobile users in an urban environment access content on the internet from different locations. It is challenging for the current service providers to cope with the increasing content demand from a large number of collocated mobile users. In-network caching to offload content at nodes closer to users alleviate the issue, though efficient cache management is required to find out who should cache what…
▽ More
Mobile users in an urban environment access content on the internet from different locations. It is challenging for the current service providers to cope with the increasing content demand from a large number of collocated mobile users. In-network caching to offload content at nodes closer to users alleviate the issue, though efficient cache management is required to find out who should cache what, when and where in an urban environment, given nodes limited computing, communication and caching resources. To address this, we first define a novel relation between content popularity and availability in the network and investigate a node's eligibility to cache content based on its urban reachability. We then allow nodes to self-organize into mobile fogs to increase the distributed cache and maximize content availability in a cost-effective manner. However, to cater rational nodes, we propose a coalition game for the nodes to offer a maximum "virtual cache" assuming a monetary reward is paid to them by the service/content provider. Nodes are allowed to merge into different spatio-temporal coalitions in order to increase the distributed cache size at the network edge. Results obtained through simulations using realistic urban mobility trace validate the performance of our caching system showing a ratio of 60-85% of cache hits compared to the 30-40% obtained by the existing schemes and 10% in case of no coalition.
△ Less
Submitted 19 July, 2017;
originally announced July 2017.
-
A Content-based Centrality Metric for Collaborative Caching in Information-Centric Fogs
Authors:
Junaid Ahmed Khan,
Cedric Westphal,
Yacine Ghamri-Doudane
Abstract:
Information-Centric Fog Computing enables a multitude of nodes near the end-users to provide storage, communication, and computing, rather than in the cloud. In a fog network, nodes connect with each other directly to get content locally whenever possible. As the topology of the network directly influences the nodes' connectivity, there has been some work to compute the graph centrality of each no…
▽ More
Information-Centric Fog Computing enables a multitude of nodes near the end-users to provide storage, communication, and computing, rather than in the cloud. In a fog network, nodes connect with each other directly to get content locally whenever possible. As the topology of the network directly influences the nodes' connectivity, there has been some work to compute the graph centrality of each node within that network topology. The centrality is then used to distinguish nodes in the fog network, or to prioritize some nodes over others to participate in the caching fog. We argue that, for an Information-Centric Fog Computing approach, graph centrality is not an appropriate metric. Indeed, a node with low connectivity that caches a lot of content may provide a very valuable role in the network.
To capture this, we introduce acontent-based centrality (CBC) metric which takes into account how well a node is connected to the content the network is delivering, rather than to the other nodes in the network. To illustrate the validity of considering content-based centrality, we use this new metric for a collaborative caching algorithm. We compare the performance of the proposed collaborative caching with typical centrality based, non-centrality based, and non-collaborative caching mechanisms. Our simulation implements CBC on three instances of large scale realistic network topology comprising 2,896 nodes with three content replication levels. Results shows that CBC outperforms benchmark caching schemes and yields a roughly 3x improvement for the average cache hit rate.
△ Less
Submitted 3 May, 2017;
originally announced May 2017.
-
Resolution-Based Content Discovery in Network of Caches: Is the Control Traffic an Issue?
Authors:
Bita Azimdoost,
Cedric Westphal,
Hamid R. Sadjadpour
Abstract:
As networking attempts to cleanly separate the control plane and forwarding plane abstractions, it also defines a clear interface between these two layers. An underlying network state is represented as a view to act upon in the control plane. We are interested in studying some fundamental properties of this interface, both in a general framework, and in the specific case of content routing. We try…
▽ More
As networking attempts to cleanly separate the control plane and forwarding plane abstractions, it also defines a clear interface between these two layers. An underlying network state is represented as a view to act upon in the control plane. We are interested in studying some fundamental properties of this interface, both in a general framework, and in the specific case of content routing. We try to evaluate the traffic between the two planes based on allowing a minimum level of acceptable distortion in the network state representation in the control plane.
We apply our framework to content distribution, and see how we can compute the overhead of maintaining the location of content in the control plane. This is of importance to evaluate resolution-based content discovery in content-oriented network architectures: we identify scenarios where the cost of updating the control plane for content routing overwhelms the benefit of fetching the nearest copy. We also show how to minimize the cost of this overhead when associating costs to peering traffic and to internal traffic for network of caches.
△ Less
Submitted 3 April, 2017;
originally announced April 2017.
-
Fundamental Limits on Throughput Capacity in Information-Centric Network
Authors:
Bita Azimdoost,
Cedric Westphal,
Hamid R. Sadjadpour
Abstract:
Wireless information-centric networks consider storage as one of the network primitives, and propose to cache data within the network in order to improve latency and reduce bandwidth consumption. We study the throughput capacity and latency in an information-centric network when the data cached in each node has a limited lifetime. The results show that with some fixed request and cache expiration…
▽ More
Wireless information-centric networks consider storage as one of the network primitives, and propose to cache data within the network in order to improve latency and reduce bandwidth consumption. We study the throughput capacity and latency in an information-centric network when the data cached in each node has a limited lifetime. The results show that with some fixed request and cache expiration rates, the order of the data access time does not change with network growth, and the maximum throughput order is not changing with the network growth in grid networks, and is inversely proportional to the number of nodes in one cell in random networks. Comparing these values with the corresponding throughput and latency with no cache capability (throughput inversely proportional to the network size, and latency of order $\sqrt{n}$ and the inverse of the transmission range in grid and random networks, respectively), we can actually quantify the asymptotic advantage of caching. Moreover, we compare these scaling laws for different content discovery mechanisms and illustrate that not much gain is lost when a simple path search is used.
△ Less
Submitted 19 October, 2016;
originally announced October 2016.
-
Resource Provisioning and Profit Maximization for Transcoding in Information Centric Networking
Authors:
Guanyu Gao,
Yonggang Wen,
Cedric Westphal
Abstract:
Adaptive bitrate streaming (ABR) has been widely adopted to support video streaming services over heterogeneous devices and varying network conditions. With ABR, each video content is transcoded into multiple representations in different bitrates and resolutions. However, video transcoding is computing intensive, which requires the transcoding service providers to deploy a large number of servers…
▽ More
Adaptive bitrate streaming (ABR) has been widely adopted to support video streaming services over heterogeneous devices and varying network conditions. With ABR, each video content is transcoded into multiple representations in different bitrates and resolutions. However, video transcoding is computing intensive, which requires the transcoding service providers to deploy a large number of servers for transcoding the video contents published by the content producers. As such, a natural question for the transcoding service provider is how to provision the computing resource for transcoding the video contents while maximizing service profit. To address this problem, we design a cloud video transcoding system by taking the advantage of cloud computing technology to elastically allocate computing resource. We propose a method for jointly considering the task scheduling and resource provisioning problem in two timescales, and formulate the service profit maximization as a two-timescale stochastic optimization problem. We derive some approximate policies for the task scheduling and resource provisioning. Based on our proposed methods, we implement our open source cloud video transcoding system Morph and evaluate its performance in a real environment. The experiment results demonstrate that our proposed method can reduce the resource consumption and achieve a higher profit compared with the baseline schemes.
△ Less
Submitted 18 May, 2016;
originally announced May 2016.
-
Exploiting Network Awareness to Enhance DASH Over Wireless
Authors:
Francesco Bronzino,
Dragoslav Stojadinovic,
Cedric Westphal,
Dipankar Raychaudhuri
Abstract:
The introduction of Dynamic Adaptive Streaming over HTTP (DASH) helped reduce the consumption of resource in video delivery, but its client-based rate adaptation is unable to optimally use the available end-to-end network bandwidth. We consider the problem of optimizing the delivery of video content to mobile clients while meeting the constraints imposed by the available network resources. Observi…
▽ More
The introduction of Dynamic Adaptive Streaming over HTTP (DASH) helped reduce the consumption of resource in video delivery, but its client-based rate adaptation is unable to optimally use the available end-to-end network bandwidth. We consider the problem of optimizing the delivery of video content to mobile clients while meeting the constraints imposed by the available network resources. Observing the bandwidth available in the network's two main components, core network, transferring the video from the servers to edge nodes close to the client, and the edge network, which is in charge of transferring the content to the user, via wireless links, we aim to find an optimal solution by exploiting the predictability of future user requests of sequential video segments, as well as the knowledge of available infrastructural resources at the core and edge wireless networks in a given future time window. Instead of regarding the bottleneck of the end-to-end connection as our throughput, we distribute the traffic load over time and use intermediate nodes between the server and the client for buffering video content to achieve higher throughput, and ultimately significantly improve the Quality of Experience for the end user in comparison with current solutions.
△ Less
Submitted 18 January, 2015;
originally announced January 2015.
-
Service Provisioning and Profit Maximization in Network-assisted Adaptive HTTP Streaming
Authors:
Zhisheng Yan,
Cedric Westphal,
Xin Wang,
Chang Wen Chen
Abstract:
Adaptive HTTP streaming with centralized consideration of multiple streams has gained increasing interest. It poses a special challenge that the interests of both content provider and network operator need to be deliberately balanced. More importantly, the adaptation strategy is required to be flexible enough to be ported to various systems that work under different network environments, QoE level…
▽ More
Adaptive HTTP streaming with centralized consideration of multiple streams has gained increasing interest. It poses a special challenge that the interests of both content provider and network operator need to be deliberately balanced. More importantly, the adaptation strategy is required to be flexible enough to be ported to various systems that work under different network environments, QoE levels, and economic objectives. To address these challenges, we propose a Markov Decision Process (MDP) based network-assisted adaptation framework, wherein cost of buffering, significant playback variation, bandwidth management and income of playback are jointly investigated. We then demonstrate its promising service provisioning and maximal profit for a mobile network in which fair or differentiated service is required.
△ Less
Submitted 17 January, 2015;
originally announced January 2015.
-
The Price of Updating the Control Plane in Information-Centric Networks
Authors:
Bita Azimdoost,
Cedric Westphal,
Hamid R. Sadjadpour
Abstract:
We are studying some fundamental properties of the interface between control and data planes in Information-Centric Networks. We try to evaluate the traffic between these two planes based on allowing a minimum level of acceptable distortion in the network state representation in the control plane. We apply our framework to content distribution, and see how we can compute the overhead of maintainin…
▽ More
We are studying some fundamental properties of the interface between control and data planes in Information-Centric Networks. We try to evaluate the traffic between these two planes based on allowing a minimum level of acceptable distortion in the network state representation in the control plane. We apply our framework to content distribution, and see how we can compute the overhead of maintaining the location of content in the control plane. This is of importance to evaluate content-oriented network architectures: we identify scenarios where the cost of updating the control plane for content routing overwhelms the benefit of fetching a nearby copy. We also show how to minimize the cost of this overhead when associating costs to peering traffic and to internal traffic for operator-driven CDNs.
△ Less
Submitted 5 June, 2014;
originally announced June 2014.
-
A Stable Fountain Code Mechanism for Peer-to-Peer Content Distribution
Authors:
Cedric Westphal
Abstract:
Most peer-to-peer content distribution systems require the peers to privilege the welfare of the overall system over greedily maximizing their own utility. When downloading a file broken up into multiple pieces, peers are often asked to pass on some possible download opportunities of common pieces in order to favor rare pieces. This is to avoid the missing piece syndrome, which throttles the downl…
▽ More
Most peer-to-peer content distribution systems require the peers to privilege the welfare of the overall system over greedily maximizing their own utility. When downloading a file broken up into multiple pieces, peers are often asked to pass on some possible download opportunities of common pieces in order to favor rare pieces. This is to avoid the missing piece syndrome, which throttles the download rate of the peer-to-peer system to that of downloading the file straight from the server. In other situations, peers are asked to stay in the system even though they have collected all the file's pieces and have an incentive to leave right away.
We propose a mechanism which allows peers to act greedily and yet stabilizes the peer-to-peer content sharing system. Our mechanism combines a fountain code at the server to generate innovative new pieces, and a prioritization for the server to deliver pieces only to new peers. While by itself, neither the fountain code nor the prioritization of new peers alone stabilizes the system, we demonstrate that their combination does, through both analytical and numerical evaluation.
△ Less
Submitted 20 January, 2014;
originally announced January 2014.
-
On the Benefit of Information Centric Networks for Traffic Engineering
Authors:
Kai Su,
Cedric Westphal
Abstract:
Current Internet performs traffic engineering (TE) by estimating traffic matrices on a regular schedule, and allocating flows based upon weights computed from these matrices. This means the allocation is based upon a guess of the traffic in the network based on its history. Information-Centric Networks on the other hand provide a finer-grained description of the traffic: a content between a client…
▽ More
Current Internet performs traffic engineering (TE) by estimating traffic matrices on a regular schedule, and allocating flows based upon weights computed from these matrices. This means the allocation is based upon a guess of the traffic in the network based on its history. Information-Centric Networks on the other hand provide a finer-grained description of the traffic: a content between a client and a server is uniquely identified by its name, and the network can therefore learn the size of different content items, and perform traffic engineering and resource allocation accordingly. We claim that Information-Centric Networks can therefore provide a better handle to perform traffic engineering, resulting in significant performance gain.
We present a mechanism to perform such resource allocation. We see that our traffic engineering method only requires knowledge of the flow size (which, in ICN, can be learned from previous data transfers) and outperforms a min-MLU allocation in terms of response time. We also see that our method identifies the traffic allocation patterns similar to that of min-MLU without having access to the traffic matrix ahead of time. We show a very significant gain in response time where min MLU is almost 50% slower than our ICN-based TE method.
△ Less
Submitted 4 November, 2013;
originally announced November 2013.
-
WARP: A ICN architecture for social data
Authors:
Fabio Angius,
Cedric Westphal,
Mario Gerla,
Giovanni Pau
Abstract:
Social network companies maintain complete visibility and ownership of the data they store. However users should be able to maintain full control over their content. For this purpose, we propose WARP, an architecture based upon Information-Centric Networking (ICN) designs, which expands the scope of the ICN architecture beyond media distribution, to provide data control in social networks. The ben…
▽ More
Social network companies maintain complete visibility and ownership of the data they store. However users should be able to maintain full control over their content. For this purpose, we propose WARP, an architecture based upon Information-Centric Networking (ICN) designs, which expands the scope of the ICN architecture beyond media distribution, to provide data control in social networks. The benefit of our solution lies in the lightweight nature of the protocol and in its layered design. With WARP, data distribution and access policies are enforced on the user side. Data can still be replicated in an ICN fashion but we introduce control channels, named \textit{thread updates}, which ensures that the access to the data is always updated to the latest control policy. WARP decentralizes the social network but still offers APIs so that social network providers can build products and business models on top of WARP. Social applications run directly on the user's device and store their data on the user's \textit{butler} that takes care of encryption and distribution. Moreover, users can still rely on third parties to have high-availability without renouncing their privacy.
△ Less
Submitted 8 August, 2013;
originally announced August 2013.
-
On the Interaction of Adaptive Video Streaming with Content-Centric Networking
Authors:
Reinhard Grandl,
Kai Su,
Cedric Westphal
Abstract:
Two main trends in today's internet are of major interest for video streaming services: most content delivery platforms coincide towards using adaptive video streaming over HTTP and new network architectures allowing caching at intermediate points within the network. We investigate one of the most popular streaming service in terms of rate adaptation and opportunistic caching. Our experimental stu…
▽ More
Two main trends in today's internet are of major interest for video streaming services: most content delivery platforms coincide towards using adaptive video streaming over HTTP and new network architectures allowing caching at intermediate points within the network. We investigate one of the most popular streaming service in terms of rate adaptation and opportunistic caching. Our experimental study shows that the streaming client's rate selection trajectory, i.e., the set of selected segments of varied bit rates which constitute a complete video, is not repetitive across separate downloads. Also, the involvement of caching could lead to frequent alternation between cache and server when serving back client's requests for video segments. These observations warrant cautions for rate adaption algorithm design and trigger our analysis to characterize the performance of in-network caching for HTTP streaming. Our analytic results show: (i) a significant degradation of cache hit rate for adaptive streaming, with a typical file popularity distribution in nowadays internet; (ii) as a result of the (usually) higher throughput at the client-cache connection compared to client-server one, cache-server oscillations due to misjudgments of the rate adaptation algorithm occur. Finally, we introduce DASH-INC, a framework for improved video streaming in caching networks including transcoding and multiple throughput estimation.
△ Less
Submitted 3 July, 2013; v1 submitted 2 July, 2013;
originally announced July 2013.
-
Scalable Routing Easy as PIE: a Practical Isometric Embedding Protocol (Technical Report)
Authors:
Julien Herzen,
Cedric Westphal,
Patrick Thiran
Abstract:
We present PIE, a scalable routing scheme that achieves 100% packet delivery and low path stretch. It is easy to implement in a distributed fashion and works well when costs are associated to links. Scalability is achieved by using virtual coordinates in a space of concise dimensionality, which enables greedy routing based only on local knowledge. PIE is a general routing scheme, meaning that it w…
▽ More
We present PIE, a scalable routing scheme that achieves 100% packet delivery and low path stretch. It is easy to implement in a distributed fashion and works well when costs are associated to links. Scalability is achieved by using virtual coordinates in a space of concise dimensionality, which enables greedy routing based only on local knowledge. PIE is a general routing scheme, meaning that it works on any graph. We focus however on the Internet, where routing scalability is an urgent concern. We show analytically and by using simulation that the scheme scales extremely well on Internet-like graphs. In addition, its geometric nature allows it to react efficiently to topological changes or failures by finding new paths in the network at no cost, yielding better delivery ratios than standard algorithms. The proposed routing scheme needs an amount of memory polylogarithmic in the size of the network and requires only local communication between the nodes. Although each node constructs its coordinates and routes packets locally, the path stretch remains extremely low, even lower than for centralized or less scalable state-of-the-art algorithms: PIE always finds short paths and often enough finds the shortest paths.
△ Less
Submitted 9 May, 2013;
originally announced May 2013.
-
ContentFlow: Map** Content to Flows in Software Defined Networks
Authors:
Abhishek Chanda,
Cedric Westphal
Abstract:
Information-Centric Networks place content as the narrow waist of the network architecture. This allows to route based upon the content name, and not based upon the locations of the content consumer and producer. However, current Internet architecture does not support content routing at the network layer. We present ContentFlow, an Information-Centric network architecture which supports content ro…
▽ More
Information-Centric Networks place content as the narrow waist of the network architecture. This allows to route based upon the content name, and not based upon the locations of the content consumer and producer. However, current Internet architecture does not support content routing at the network layer. We present ContentFlow, an Information-Centric network architecture which supports content routing by map** the content name to an IP flow, and thus enables the use of OpenFlow switches to achieve content routing over a legacy IP architecture. ContentFlow is viewed as an evolutionary step between the current IP networking architecture, and a full fledged ICN architecture. It supports content management, content caching and content routing at the network layer, while using a legacy OpenFlow infrastructure and a modified controller. In particular, ContentFlow is transparent from the point of view of the client and the server, and can be inserted in between with no modification at either end. We have implemented ContentFlow and describe our implementation choices as well as the overall architecture specification. We evaluate the performance of ContentFlow in our testbed.
△ Less
Submitted 7 February, 2013; v1 submitted 6 February, 2013;
originally announced February 2013.
-
Content Based Traffic Engineering in Software Defined Information Centric Networks
Authors:
Abhishek Chanda,
Cedric Westphal,
Dipankar Raychaudhuri
Abstract:
This paper describes a content centric network architecture which uses software defined networking principles to implement efficient metadata driven services by extracting content metadata at the network layer. The ability to access content metadata transparently enables a number of new services in the network. Specific examples discussed here include: a metadata driven traffic engineering scheme…
▽ More
This paper describes a content centric network architecture which uses software defined networking principles to implement efficient metadata driven services by extracting content metadata at the network layer. The ability to access content metadata transparently enables a number of new services in the network. Specific examples discussed here include: a metadata driven traffic engineering scheme which uses prior knowledge of content length to optimize content delivery, a metadata driven content firewall which is more resilient than traditional firewalls and differentiated treatment of content based on the type of content being accessed. A detailed outline of an implementation of the proposed architecture is presented along with some basic evaluation.
△ Less
Submitted 31 January, 2013;
originally announced January 2013.
-
Content as a Network Primitive
Authors:
Abhishek Chanda,
Cedric Westphal
Abstract:
The current functionality supported by OpenFlowbased software defined networking (SDN) includes switching, routing, tunneling, and some basic fire walling while operating on traffic flows. However, the semantics of SDN do not allow for other operations on the traffic, nor does it allow operations at a higher granularity. In this work, we describe a method to expand the SDN framework to add other n…
▽ More
The current functionality supported by OpenFlowbased software defined networking (SDN) includes switching, routing, tunneling, and some basic fire walling while operating on traffic flows. However, the semantics of SDN do not allow for other operations on the traffic, nor does it allow operations at a higher granularity. In this work, we describe a method to expand the SDN framework to add other network primitives. In particular, we present a method to integrate different network elements (like cache, proxy etc). Here, we focus on storage and caching, but our method could be expanded to other functionality seamlessly. We also present a method to identify content so as to perform per-content policy, as opposed to per flow policy. We have implemented the proposed mechanisms to demonstrate its feasibility.
△ Less
Submitted 13 December, 2012;
originally announced December 2012.
-
Scaling Laws of the Throughput Capacity and Latency in Information-Centric Networks
Authors:
Bita Azimdoost,
Cedric Westphal,
Hamid R. Sadjadpour
Abstract:
Wireless information-centric networks consider storage as one of the network primitives, and propose to cache data within the network in order to improve latency and reduce bandwidth consumption. We study the throughput capacity and delay in an information-centric network when the data cached in each node has a limited lifetime. The results show that with some fixed request and cache expiration ra…
▽ More
Wireless information-centric networks consider storage as one of the network primitives, and propose to cache data within the network in order to improve latency and reduce bandwidth consumption. We study the throughput capacity and delay in an information-centric network when the data cached in each node has a limited lifetime. The results show that with some fixed request and cache expiration rates, the order of the data access time does not change with network growth, and the maximum throughput order is inversely proportional to the square root and logarithm of the network size $n$ in cases of grid and random networks, respectively. Comparing these values with the corresponding throughput and latency with no cache capability (throughput inversely proportional to the network size, and latency of order $\sqrt{n}$ and $\sqrt{\frac{n}{\log n}}$ in grid and random networks, respectively), we can actually quantify the asymptotic advantage of caching. Moreover, we compare these scaling laws for different content discovery mechanisms and illustrate that not much gain is lost when a simple path search is used.
△ Less
Submitted 30 April, 2015; v1 submitted 3 October, 2012;
originally announced October 2012.
-
Network Coding Meets Information-Centric Networking
Authors:
Marie-Jose Montpetit,
Cedric Westphal,
Dirk Trossen
Abstract:
The focus of user behavior in the Internet has changed over the recent years towards being driven by exchanging and accessing information. Many advances in networking technologies have utilized this change by focusing on the content of an exchange rather than the endpoints exchanging the content. Network coding and information centric networking are two examples of these technology trends, each be…
▽ More
The focus of user behavior in the Internet has changed over the recent years towards being driven by exchanging and accessing information. Many advances in networking technologies have utilized this change by focusing on the content of an exchange rather than the endpoints exchanging the content. Network coding and information centric networking are two examples of these technology trends, each being developed largely independent so far. This paper brings these areas together in an evolutionary as well as explorative setting for a new internetworking architecture. We outline opportunities for applying network coding in a novel and performance-enhancing way that could eventually push forward the case for information centric network itself.
△ Less
Submitted 11 January, 2012;
originally announced January 2012.
-
Designing and Embedding Reliable Virtual Infrastructures
Authors:
Wai-Leong Yeow,
Cédric Westphal,
Ulaş C. Kozat
Abstract:
In a virtualized infrastructure where physical resources are shared, a single physical server failure will terminate several virtual servers and crippling the virtual infrastructures which contained those virtual servers. In the worst case, more failures may cascade from overloading the remaining servers. To guarantee some level of reliability, each virtual infrastructure, at instantiation, should…
▽ More
In a virtualized infrastructure where physical resources are shared, a single physical server failure will terminate several virtual servers and crippling the virtual infrastructures which contained those virtual servers. In the worst case, more failures may cascade from overloading the remaining servers. To guarantee some level of reliability, each virtual infrastructure, at instantiation, should be augmented with backup virtual nodes and links that have sufficient capacities. This ensures that, when physical failures occur, sufficient computing resources are available and the virtual network topology is preserved. However, in doing so, the utilization of the physical infrastructure may be greatly reduced. This can be circumvented if backup resources are pooled and shared across multiple virtual infrastructures, and intelligently embedded in the physical infrastructure. These techniques can reduce the physical footprint of virtual backups while guaranteeing reliability.
△ Less
Submitted 28 May, 2010;
originally announced May 2010.