skip to main content
10.1145/3405656.3418708acmconferencesArticle/Chapter ViewAbstractPublication PagescommConference Proceedingsconference-collections
research-article
Free Access

Far Cry: Will CDNs Hear NDN's Call?

Published:22 September 2020Publication History

ABSTRACT

Content Delivery Networks (CDNs) have become indispensable to Internet content distribution. As they evolve to meet the ever-increasing demands, they are also facing challenges such as system complexity, resource footprint, and content security. In this paper, we look at CDNs once again, but this time from the eyes of a young networking technology called named-data networking (NDN). NDN supports content distribution without requiring an overlay service to bridge the gap between network services and application needs. Therefore, it can realize content distribution at large scale with an arguably simpler system design.

We conducted real-world experiments to compare the standard deployment of NDN (i.e., the global NDN testbed) and two leading CDNs (Akamai and Fastly) in terms of caching and retrieving static contents through streaming videos from four different continents over these networks for two weeks. We found that although NDN can provide a satisfactory quality of service in most cases, it falls behind CDNs mainly due to its lack of hardware infrastructure and software/protocol immaturity. Nevertheless, NDN outperforms CDNs in terms of server workload and failure resiliency due to its ubiquitous in-network caching and adaptive forwarding plane. Besides, NDN comes with built-in content security, but it needs an efficient solution for content privacy. NDN's architectural advantages make it a natural fit for Internet content distribution in the long run. That said, in terms of forthcoming goals, this paper reveals several limitations of the current NDN deployment and discusses why the future of NDN hinges on addressing those limitations.

Skip Supplemental Material Section

Supplemental Material

p89-ghasemi-presentation.mp4

mp4

43.3 MB

References

  1. Fastly release notes. https://www.fastly.com/release-notes/q1--2019. [Online].Google ScholarGoogle Scholar
  2. TeleGeography. Cable cuts disrupt Internet in Middle East and India. https://www.commsupdate.com/articles/2008/01/31/cable-cuts-disrupt-internet-in-middle-east-and-india/, January 2008. [Online].Google ScholarGoogle Scholar
  3. Akamai facts & figures. https://www.akamai.com/us/en/about/facts-figures.jsp, 2020. [Online].Google ScholarGoogle Scholar
  4. The back-end implementation of an adaptive video streaming service over NDN. https://github.com/chavoosh/ndn-mongo-fileserver, 2020. [Online].Google ScholarGoogle Scholar
  5. Cisco Visual Networking Index: Forecast and Methodology, 2017--2022. https://bit.ly/3ftToFW, February 2020.Google ScholarGoogle Scholar
  6. The front-end implementation of an adaptive video streaming service over NDN. https://github.com/chavoosh/ndn-video-frontend, 2020. [Online].Google ScholarGoogle Scholar
  7. NDN Global Testbed. https://named-data.net/ndn-testbed/, 2020. [Online].Google ScholarGoogle Scholar
  8. NFD developer's guide. http://named-data.net/doc/NFD/current/, 2020. [Online].Google ScholarGoogle Scholar
  9. South East Asia-Middle East-Western Europe 4 (SEA-ME-WE 4). http://goo.gl/kW3bE, 2020. [Online].Google ScholarGoogle Scholar
  10. B. Ahlgren, C. Dannewitz, C. Imbrenda, D. Kutscher, and B. Ohlman. A survey of information-centric networking. IEEE Communications Magazine, 50(7):26--36, 2012.Google ScholarGoogle ScholarCross RefCross Ref
  11. M. Antonakakis, T. April, M. Bailey, M. Bernhard, E. Bursztein, J. Cochran, Z. Durumeric, J. A. Halderman, L. Invernizzi, M. Kallitsis, et al. Understanding the mirai botnet. In 26th USENIX Security Symposium, pages 1093--1110, 2017.Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. F. Chen, R. K. Sitaraman, and M. Torres. End-user mapping: Next generation request routing for content delivery. In ACM Conference on Special Interest Group on Data Communication, SIGCOMM'15, pages 167--181, 2015.Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. A. Compagno, M. Conti, P. Gasti, and G. Tsudik. Poseidon: Mitigating interest flooding DDoS attacks in named data networking. In 38th annual IEEE conference on local computer networks, pages 630--638, 2013.Google ScholarGoogle ScholarCross RefCross Ref
  14. S. Cui, M. R. Asghar, and G. Russello. Multi-CDN: Towards privacy in content delivery networks. IEEE Transactions on Dependable and Secure Computing, 2018.Google ScholarGoogle Scholar
  15. T. Dierks and E. Rescorla. The transport layer security (tls) protocol version 1.2. 2008.Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. S. K. Fayazbakhsh, Y. Lin, A. Tootoonchian, A. Ghodsi, T. Koponen, B. Maggs, K. Ng, V. Sekar, and S. Shenker. Less pain, most of the gain: Incrementally deployable ICN. In SIGCOMM, pages 147--158, 2013.Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. A. Flavel, P. Mani, D. Maltz, N. Holt, J. Liu, Y. Chen, and O. Surmachev. Fastroute: A scalable load-aware anycast routing architecture for modern cdns. In 12th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 15), pages 381--394, 2015.Google ScholarGoogle Scholar
  18. P. Gasti, G. Tsudik, E. Uzun, and L. Zhang. DoS and DDoS in named data networking. In 22nd International Conference on Computer Communication and Networks (ICCCN), pages 1--7, 2013.Google ScholarGoogle ScholarCross RefCross Ref
  19. A. Gawande, J. Clark, D. Coomes, and L. Wang. Decentralized and secure multimedia sharing application over named data networking. In Proceedings of the 6th ACM Conference on Information-Centric Networking, pages 19--29, 2019.Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. C. Ghasemi, H. Yousefi, K. G. Shin, and B. Zhang. A fast and memory-efficient trie structure for name-based packet forwarding. In 26th International Conference on Network Protocols (ICNP), pages 302--312, 2018.Google ScholarGoogle ScholarCross RefCross Ref
  21. C. Ghasemi, H. Yousefi, and B. Zhang. iCDN: An ndn-based cdn. In 7th ACM Conference on Information-Centric Networking, 2020.Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. C. Ghasemi, H. Yousefi, and B. Zhang. Internet-scale video streaming over NDN. IEEE Network Magazine, 2020.Google ScholarGoogle Scholar
  23. Y. Gilad, A. Herzberg, M. Sudkovitch, and M. Goberman. CDN-on-demand: An affordable DDoS defense via untrusted clouds. In NDSS, 2016.Google ScholarGoogle ScholarCross RefCross Ref
  24. P. Gusev and J. Burke. NDN-RTC: Real-time videoconferencing over named data networking. In 2nd ACM Conference on Information-Centric Networking, pages 117--126, 2015.Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Y. Inaba, Y. Tanigawa, and H. Tode. Content retrieval method in cooperation with CDN and ICN-based in-network guidance over IP network. In IEEE 40th Conference on Local Computer Networks (LCN), pages 454--457, 2015.Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. S.-W. Jeon, S.-N. Hong, M. Ji, G. Caire, and A. F. Molisch. Wireless multihop device-to-device caching networks. IEEE Transactions on Information Theory, 63(3):1662--1676, 2017.Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Y. Jia and A. Kuzmanovic. Perceiving internet anomalies via CDN replica shifts. In IEEE Conference on Computer Communications (INFOCOM'19), pages 2197--2205, 2019.Google ScholarGoogle ScholarCross RefCross Ref
  28. X. Jiang and J. Bi. ncdn: CDN Enhanced with NDN. In 2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pages 440--445, 2014.Google ScholarGoogle ScholarCross RefCross Ref
  29. S. Khoussi, D. Pesavento, L. Benmohamed, and A. Battou. NDN-trace: a path tracing utility for named data networking. In 4th ACM Conference on Information-Centric Networking, pages 116--122, 2017.Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. J. Li, H. Wu, B. Liu, J. Lu, Y. Wang, X. Wang, Y. Zhang, and L. Dong. Popularity-driven coordinated caching in named data networking. In ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS), pages 15--26, 2012.Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. J. Liang, J. Jiang, H. Duan, K. Li, T. Wan, and J. Wu. When HTTPS meets CDN: A case of authentication in delegated service. In IEEE Symposium on Security and Privacy, pages 67--82, 2014.Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. T. Liang, J. Pan, and B. Zhang. NDNizing existing applications: research issues and experiences. In 5th ACM Conference on Information-Centric Networking, pages 172--183, 2018.Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. T. Lin, Y. Xu, G. Zhang, Y. Xin, Y. Li, and S. Ci. R-iCDN: An approach supporting flexible content routing for ISP-operated CDN. In 9th ACM Workshop on Mobility in the Evolving Internet Architecture, MobiArch'14, pages 61--66, 2014.Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. G. Ma, Z. Chen, J. Cao, Z. Guo, Y. Jiang, and X. Guo. A tentative comparison on CDN and NDN. In 2014 IEEE international conference on systems, man, and cybernetics (SMC), pages 2893--2898, 2014.Google ScholarGoogle ScholarCross RefCross Ref
  35. M. Mangili, F. Martignon, and A. Capone. Performance analysis of content-centric and content-delivery networks with evolving object popularity. Computer Networks, 94:80--98, 2016.Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. K. Nichols. Lessons learned building a secure network measurement framework using basic NDN. In 6th ACM Conference on Information-Centric Networking, pages 112--122, 2019.Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. E. Nygren, R. K. Sitaraman, and J. Sun. The Akamai network: A platform for high-performance internet applications. SIGOPS Oper. Syst. Rev., 44(3):2--19, 2010.Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. M. K. Pathan and R. Buyya. A taxonomy and survey of content delivery networks. Grid Computing and Distributed Systems Laboratory, University of Melbourne, Technical Report, 2007.Google ScholarGoogle Scholar
  39. D. Pesavento, O. I. E. Mimouni, E. Newberry, L. Benmohamed, and A. Battou. A network measurement framework for named data networks. In 4th ACM Conference on Information-Centric Networking, pages 200--201, 2017.Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. T. Plagemann, V. Goebel, A. Mauthe, L. Mathy, T. Turletti, and G. Urvoy-Keller. From content distribution networks to content networks---issues and challenges. Computer Communications, 29(5):551--562, 2006.Google ScholarGoogle ScholarDigital LibraryDigital Library
  41. K. Poularakis and L. Tassiulas. On the complexity of optimal content placement in hierarchical caching networks. IEEE Transactions on Communications, 64(5):2092--2103, 2016.Google ScholarGoogle ScholarCross RefCross Ref
  42. D. Rossi and E. Turrini. Analyzing performance data exchange in content delivery networks. In International Conference on Networking, pages 737--745. Springer, 2005.Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. J. Sahoo, M. A. Salahuddin, R. Glitho, H. Elbiaze, and W. Ajib. A survey on replica server placement algorithms for content delivery networks. IEEE Communications Surveys Tutorials, 19(2):1002--1026, 2017.Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. R. K. Sitaraman, M. Kasbekar, W. Lichtenstein, and M. Jain. Overlay networks: An Akamai perspective. Advanced Content Delivery, Streaming, and Cloud Services, pages 305--328, 2014.Google ScholarGoogle Scholar
  45. S. R. Srinivasan, J. W. Lee, D. L. Batni, and H. G. Schulzrinne. ActiveCDN: Cloud computing meets content delivery networks. Columbia University, Technical Report, 2011.Google ScholarGoogle Scholar
  46. J. Thompson, P. Gusev, and J. Burke. NDN-CNL: A hierarchical namespace API for named data networking. In 6th ACM Conference on Information-Centric Networking, page 30--36, 2019.Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. Y. Yu, A. Afanasyev, D. Clark, K. Claffy, V.Jacobson, and L. Zhang. Schematizing trust in named data networking. In 2nd ACM Conference on Information-Centric Networking, pages 177--186, 2015.Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. L. Zhang, A. Afanasyev, J. Burke, V.Jacobson, k. claffy, P. Crowley, C. Papadopoulos, L. Wang, and B. Zhang. Named data networking. SIGCOMM Comput. Commun. Rev., 44(3):66--73, 2014.Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Far Cry: Will CDNs Hear NDN's Call?

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            ICN '20: Proceedings of the 7th ACM Conference on Information-Centric Networking
            September 2020
            181 pages
            ISBN:9781450380409
            DOI:10.1145/3405656

            Copyright © 2020 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 22 September 2020

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article
            • Research
            • Refereed limited

            Acceptance Rates

            ICN '20 Paper Acceptance Rate15of39submissions,38%Overall Acceptance Rate133of482submissions,28%

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader