Open Access   Article Go Back

A Survey on Caching in Named Data Network

Ganesh Pakle1 , Neha Bais2 , Ramchandra Manthalkar3

Section:Survey Paper, Product Type: Journal Paper
Volume-6 , Issue-12 , Page no. 781-787, Dec-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i12.781787

Online published on Dec 31, 2018

Copyright © Ganesh Pakle, Neha Bais, Ramchandra Manthalkar . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Ganesh Pakle, Neha Bais, Ramchandra Manthalkar, “A Survey on Caching in Named Data Network,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.12, pp.781-787, 2018.

MLA Style Citation: Ganesh Pakle, Neha Bais, Ramchandra Manthalkar "A Survey on Caching in Named Data Network." International Journal of Computer Sciences and Engineering 6.12 (2018): 781-787.

APA Style Citation: Ganesh Pakle, Neha Bais, Ramchandra Manthalkar, (2018). A Survey on Caching in Named Data Network. International Journal of Computer Sciences and Engineering, 6(12), 781-787.

BibTex Style Citation:
@article{Pakle_2018,
author = {Ganesh Pakle, Neha Bais, Ramchandra Manthalkar},
title = {A Survey on Caching in Named Data Network},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {12 2018},
volume = {6},
Issue = {12},
month = {12},
year = {2018},
issn = {2347-2693},
pages = {781-787},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3415},
doi = {https://doi.org/10.26438/ijcse/v6i12.781787}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i12.781787}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3415
TI - A Survey on Caching in Named Data Network
T2 - International Journal of Computer Sciences and Engineering
AU - Ganesh Pakle, Neha Bais, Ramchandra Manthalkar
PY - 2018
DA - 2018/12/31
PB - IJCSE, Indore, INDIA
SP - 781-787
IS - 12
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
383 200 downloads 178 downloads
  
  
           

Abstract

To replace the present host-driven IP-based Internet architecture, Content-Centric Networking (CCN) is considered as conceivable substitution and is been developing worldwide. In CCN, the content name rather than IP address of host becomes the primary entity. Content is in this manner decoupled from its location. In addition to other things, this allows the cache to be ubiquitously present. One of the famous examples of CCN is Named Data Networking (NDN). To satisfy the incoming request for data, every node in NDN is permitted to have its own local cache. For productive huge scale content dissemination, NDN is been made a decent architecture because of this. This paper focuses on various caching techniques and explains many of them briefly. NS-3 based Named Data Networking simulator named as ndnSIM is used to assess proposed scheme.

Key-Words / Index Term

NDN, CCN , CS, FIB, PIT, ndnSIM, NS-3

References

[1] Zhang, Lixia, et al. "Named data networking (ndn) project." Relatório Técnico NDN-0001, Xerox Palo Alto Research Center-PARC 157 (2010): 158. J. Pan, S. Paul, and R. Jain, “A survey of the research on future internet architectures,” IEEE Communications Magazine, vol. 49, no. 7, 2011.
[2] J. Pan, S. Paul, and R. Jain, “A survey of the research on future internet architectures,” IEEE Communications Magazine, vol. 49, no. 7, 2011.
[3] S. Guo, H. Xie, and G. Shi, "Collaborative Forwarding and Caching in Content-Centric Networks," pp. 41–55, 2012.
[4] Saxena, Divya, et al. "Named data networking: a survey." Computer Science Review 19 (2016): 15-55.
[5] J. Li, H. Wu, B. Liu, and J. Lu, “Effective Caching Schemes for Minimizing Inter-ISP Traffic in Named Data Networking,” pp. 580–587, 2012.
[6] H. Wu, J. Li, Y. Wang, and B. Liu, “EMC : The Effective Multi-path Caching Scheme for Named Data Networking,” 2013.
[7] J. Li, H. Wu, B. Liu, J. Lu, Y. Wang, and X. Wang, “Popularity-driven Coordinated Caching in Named Data Networking,” 2012.
[8] N. Aloulou, M. Ayari, M. F. Zhani, and L. Saidane, “A popularity-driven controller-based routing and cooperative caching for named data networks,” 2015 International Conference on the Network of the Future, NOF 2015, 2015.
[9] Yeh, Edmund, et al. "Vip: A framework for joint dynamic forwarding and caching in named data networks." Proceedings of the 1st ACM Conference on Information-Centric Networking. ACM, 2014.
[10] K. Cho, M. Lee, K. Park, T. T. Kwon, and Y. Choi, “WAVE : Popularity-based and Collaborative In-network Caching for Content-Oriented Networks,” pp. 1–6.
[11] N. Laoutaris, O. Telelis, V. Zissimopoulos, and I. Stavrakakis, "Distributed selfish replication," IEEE Transactions on Parallel and Distributed Systems, vol. 17, no. 12, pp. 1401–1413, 2006.
[12] X. Hu, C. Papadopoulos, J. Gong, and D. Massey, “Not So Cooperative Caching in Named Data Networking,” pp. 2263–2268, 2013.
[13] Rezazad, Mostafa, and Y. C. Tay. "A cache miss equation for partitioning an NDN content store." Proceedings of the 9th Asian Internet Engineering Conference. ACM, 2013.
[14] Wellem, Theophilus, Yu-Kuen Lai, and Wen-Yaw Chung. "2015 ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS)."
[15] Y. Zeng and X. Hong, “A caching strategy in mobile ad hoc named data network,” Proceedings of the 2011 6th International ICST Conference on Communications and Networking in China, CHINACOM 2011, pp. 805–809, 2011.
[16] C. Barakat, A. Kalla, D. Saucez, T. Turletti, and I. S. Antipolis-m, “Minimizing Bandwidth on Peering Links with Deflection in Named Data Networking.”
[17] M. Dehghan, B. Jiang, A. Dabirmoghaddam, and D. Towsley, “On the Analysis of Caches with Pending Interest Tables,” pp. 69–78.
[18] W. Dron, A. Leung, M. Uddin, S. Wang, T. Abdelzaher, R. Govindan, and J. Hancock, “Information-maximizing caching in Ad Hoc networks with named data networking,” Proceedings of the 2013 IEEE 2nd International Network Science Workshop, NSW 2013, pp. 90–93, 2013.
[19] Ran, Jianhua, et al. "On performance of cache policies in named data networking." International Conference on Advanced Computer Science and Electronics Information. 2013
[20] H. Dai, Y. Wang, H. Wu, J. Lu, and B. Liu, “Towards Line-Speed and Accurate On-line Popularity Monitoring on NDN Routers.”
[21] W. Gao, G. Cao, A. Iyengar, and M. Srivatsa, “Supporting cooperative caching in disruption tolerant networks,” Proceedings - International Conference on Distributed Computing Systems, pp. 151–161, 2011.
[22] H. Yan, D. Gao, W. Su, C. H. Foh, H. Zhang, and A. V. Vasilakos, “Caching Strategy Based on Hierarchical Cluster for Named Data Networking,” IEEE Access, vol. 5, no. c, pp. 8433–8443, 2017.
[23] V. Sourlas, L. Gkatzikis, P. Flegkas, and L. Tassiulas, “Distributed cache management in information-centric networks,” IEEE Transactions on Network and Service Management, vol. 10, no. 3, pp. 286–299, 2013.
[24] K. Mori, T. Kamimoto, and H. Shigeno, “Push-Based Traffic-Aware Cache Management in Named Data Networking,” 2015.
[25] H. Farahat, “Optimal Caching for Producer Mobility Support in Named Data Networks,” 2016.
[26] M. Faran, M. N. Dailey, R. Khan, and A. Tunpan, “Pre-caching : A proactive scheme for caching video tra ffi c in named data mesh networks,” vol. 87, no. March, pp. 116–130, 2017.
[27] Rao, Ying, et al. "Proactive caching for enhancing user-side mobility support in named data networking." Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 2013 Seventh International Conference on. IEEE, 2013.
[28] Ramesh Bandaru and Rao S Basavala , "Information Leakage through Social Networking Websites leads to Lack of Privacy and Identity Theft Security Issues", International Journal of Scientific Research in Computer Science and Engineering, Vol.1, Issue.3, pp.1-7, 2013.
[29] Sanjay E. Pate, Bhojaraj H. Barhate, "A survey of Possible Attacks on Text & Graphical Password Authentication Techniques", International Journal of Scientific Research in Computer Science and Engineering, Vol.06, Issue.01, pp.77-80, 2018.