ABSTRACT
Content Delivery Networks (CDNs) have become indispensable to Internet content distribution. As they evolve to meet the ever-increasing demands, they are also facing challenges such as system complexity, resource footprint, and content security. In this paper, we look at CDNs once again, but this time from the eyes of a young networking technology called named-data networking (NDN). NDN supports content distribution without requiring an overlay service to bridge the gap between network services and application needs. Therefore, it can realize content distribution at large scale with an arguably simpler system design.
We conducted real-world experiments to compare the standard deployment of NDN (i.e., the global NDN testbed) and two leading CDNs (Akamai and Fastly) in terms of caching and retrieving static contents through streaming videos from four different continents over these networks for two weeks. We found that although NDN can provide a satisfactory quality of service in most cases, it falls behind CDNs mainly due to its lack of hardware infrastructure and software/protocol immaturity. Nevertheless, NDN outperforms CDNs in terms of server workload and failure resiliency due to its ubiquitous in-network caching and adaptive forwarding plane. Besides, NDN comes with built-in content security, but it needs an efficient solution for content privacy. NDN's architectural advantages make it a natural fit for Internet content distribution in the long run. That said, in terms of forthcoming goals, this paper reveals several limitations of the current NDN deployment and discusses why the future of NDN hinges on addressing those limitations.
Supplemental Material
- Fastly release notes. https://www.fastly.com/release-notes/q1--2019. [Online].Google Scholar
- TeleGeography. Cable cuts disrupt Internet in Middle East and India. https://www.commsupdate.com/articles/2008/01/31/cable-cuts-disrupt-internet-in-middle-east-and-india/, January 2008. [Online].Google Scholar
- Akamai facts & figures. https://www.akamai.com/us/en/about/facts-figures.jsp, 2020. [Online].Google Scholar
- The back-end implementation of an adaptive video streaming service over NDN. https://github.com/chavoosh/ndn-mongo-fileserver, 2020. [Online].Google Scholar
- Cisco Visual Networking Index: Forecast and Methodology, 2017--2022. https://bit.ly/3ftToFW, February 2020.Google Scholar
- The front-end implementation of an adaptive video streaming service over NDN. https://github.com/chavoosh/ndn-video-frontend, 2020. [Online].Google Scholar
- NDN Global Testbed. https://named-data.net/ndn-testbed/, 2020. [Online].Google Scholar
- NFD developer's guide. http://named-data.net/doc/NFD/current/, 2020. [Online].Google Scholar
- South East Asia-Middle East-Western Europe 4 (SEA-ME-WE 4). http://goo.gl/kW3bE, 2020. [Online].Google Scholar
- B. Ahlgren, C. Dannewitz, C. Imbrenda, D. Kutscher, and B. Ohlman. A survey of information-centric networking. IEEE Communications Magazine, 50(7):26--36, 2012.Google ScholarCross Ref
- M. Antonakakis, T. April, M. Bailey, M. Bernhard, E. Bursztein, J. Cochran, Z. Durumeric, J. A. Halderman, L. Invernizzi, M. Kallitsis, et al. Understanding the mirai botnet. In 26th USENIX Security Symposium, pages 1093--1110, 2017.Google ScholarDigital Library
- F. Chen, R. K. Sitaraman, and M. Torres. End-user mapping: Next generation request routing for content delivery. In ACM Conference on Special Interest Group on Data Communication, SIGCOMM'15, pages 167--181, 2015.Google ScholarDigital Library
- A. Compagno, M. Conti, P. Gasti, and G. Tsudik. Poseidon: Mitigating interest flooding DDoS attacks in named data networking. In 38th annual IEEE conference on local computer networks, pages 630--638, 2013.Google ScholarCross Ref
- S. Cui, M. R. Asghar, and G. Russello. Multi-CDN: Towards privacy in content delivery networks. IEEE Transactions on Dependable and Secure Computing, 2018.Google Scholar
- T. Dierks and E. Rescorla. The transport layer security (tls) protocol version 1.2. 2008.Google ScholarDigital Library
- S. K. Fayazbakhsh, Y. Lin, A. Tootoonchian, A. Ghodsi, T. Koponen, B. Maggs, K. Ng, V. Sekar, and S. Shenker. Less pain, most of the gain: Incrementally deployable ICN. In SIGCOMM, pages 147--158, 2013.Google ScholarDigital Library
- A. Flavel, P. Mani, D. Maltz, N. Holt, J. Liu, Y. Chen, and O. Surmachev. Fastroute: A scalable load-aware anycast routing architecture for modern cdns. In 12th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 15), pages 381--394, 2015.Google Scholar
- P. Gasti, G. Tsudik, E. Uzun, and L. Zhang. DoS and DDoS in named data networking. In 22nd International Conference on Computer Communication and Networks (ICCCN), pages 1--7, 2013.Google ScholarCross Ref
- A. Gawande, J. Clark, D. Coomes, and L. Wang. Decentralized and secure multimedia sharing application over named data networking. In Proceedings of the 6th ACM Conference on Information-Centric Networking, pages 19--29, 2019.Google ScholarDigital Library
- C. Ghasemi, H. Yousefi, K. G. Shin, and B. Zhang. A fast and memory-efficient trie structure for name-based packet forwarding. In 26th International Conference on Network Protocols (ICNP), pages 302--312, 2018.Google ScholarCross Ref
- C. Ghasemi, H. Yousefi, and B. Zhang. iCDN: An ndn-based cdn. In 7th ACM Conference on Information-Centric Networking, 2020.Google ScholarDigital Library
- C. Ghasemi, H. Yousefi, and B. Zhang. Internet-scale video streaming over NDN. IEEE Network Magazine, 2020.Google Scholar
- Y. Gilad, A. Herzberg, M. Sudkovitch, and M. Goberman. CDN-on-demand: An affordable DDoS defense via untrusted clouds. In NDSS, 2016.Google ScholarCross Ref
- P. Gusev and J. Burke. NDN-RTC: Real-time videoconferencing over named data networking. In 2nd ACM Conference on Information-Centric Networking, pages 117--126, 2015.Google ScholarDigital Library
- Y. Inaba, Y. Tanigawa, and H. Tode. Content retrieval method in cooperation with CDN and ICN-based in-network guidance over IP network. In IEEE 40th Conference on Local Computer Networks (LCN), pages 454--457, 2015.Google ScholarDigital Library
- S.-W. Jeon, S.-N. Hong, M. Ji, G. Caire, and A. F. Molisch. Wireless multihop device-to-device caching networks. IEEE Transactions on Information Theory, 63(3):1662--1676, 2017.Google ScholarDigital Library
- Y. Jia and A. Kuzmanovic. Perceiving internet anomalies via CDN replica shifts. In IEEE Conference on Computer Communications (INFOCOM'19), pages 2197--2205, 2019.Google ScholarCross Ref
- X. Jiang and J. Bi. ncdn: CDN Enhanced with NDN. In 2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), pages 440--445, 2014.Google ScholarCross Ref
- S. Khoussi, D. Pesavento, L. Benmohamed, and A. Battou. NDN-trace: a path tracing utility for named data networking. In 4th ACM Conference on Information-Centric Networking, pages 116--122, 2017.Google ScholarDigital Library
- J. Li, H. Wu, B. Liu, J. Lu, Y. Wang, X. Wang, Y. Zhang, and L. Dong. Popularity-driven coordinated caching in named data networking. In ACM/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS), pages 15--26, 2012.Google ScholarDigital Library
- J. Liang, J. Jiang, H. Duan, K. Li, T. Wan, and J. Wu. When HTTPS meets CDN: A case of authentication in delegated service. In IEEE Symposium on Security and Privacy, pages 67--82, 2014.Google ScholarDigital Library
- T. Liang, J. Pan, and B. Zhang. NDNizing existing applications: research issues and experiences. In 5th ACM Conference on Information-Centric Networking, pages 172--183, 2018.Google ScholarDigital Library
- T. Lin, Y. Xu, G. Zhang, Y. Xin, Y. Li, and S. Ci. R-iCDN: An approach supporting flexible content routing for ISP-operated CDN. In 9th ACM Workshop on Mobility in the Evolving Internet Architecture, MobiArch'14, pages 61--66, 2014.Google ScholarDigital Library
- G. Ma, Z. Chen, J. Cao, Z. Guo, Y. Jiang, and X. Guo. A tentative comparison on CDN and NDN. In 2014 IEEE international conference on systems, man, and cybernetics (SMC), pages 2893--2898, 2014.Google ScholarCross Ref
- M. Mangili, F. Martignon, and A. Capone. Performance analysis of content-centric and content-delivery networks with evolving object popularity. Computer Networks, 94:80--98, 2016.Google ScholarDigital Library
- K. Nichols. Lessons learned building a secure network measurement framework using basic NDN. In 6th ACM Conference on Information-Centric Networking, pages 112--122, 2019.Google ScholarDigital Library
- E. Nygren, R. K. Sitaraman, and J. Sun. The Akamai network: A platform for high-performance internet applications. SIGOPS Oper. Syst. Rev., 44(3):2--19, 2010.Google ScholarDigital Library
- M. K. Pathan and R. Buyya. A taxonomy and survey of content delivery networks. Grid Computing and Distributed Systems Laboratory, University of Melbourne, Technical Report, 2007.Google Scholar
- D. Pesavento, O. I. E. Mimouni, E. Newberry, L. Benmohamed, and A. Battou. A network measurement framework for named data networks. In 4th ACM Conference on Information-Centric Networking, pages 200--201, 2017.Google ScholarDigital Library
- T. Plagemann, V. Goebel, A. Mauthe, L. Mathy, T. Turletti, and G. Urvoy-Keller. From content distribution networks to content networks---issues and challenges. Computer Communications, 29(5):551--562, 2006.Google ScholarDigital Library
- K. Poularakis and L. Tassiulas. On the complexity of optimal content placement in hierarchical caching networks. IEEE Transactions on Communications, 64(5):2092--2103, 2016.Google ScholarCross Ref
- D. Rossi and E. Turrini. Analyzing performance data exchange in content delivery networks. In International Conference on Networking, pages 737--745. Springer, 2005.Google ScholarDigital Library
- J. Sahoo, M. A. Salahuddin, R. Glitho, H. Elbiaze, and W. Ajib. A survey on replica server placement algorithms for content delivery networks. IEEE Communications Surveys Tutorials, 19(2):1002--1026, 2017.Google ScholarDigital Library
- R. K. Sitaraman, M. Kasbekar, W. Lichtenstein, and M. Jain. Overlay networks: An Akamai perspective. Advanced Content Delivery, Streaming, and Cloud Services, pages 305--328, 2014.Google Scholar
- S. R. Srinivasan, J. W. Lee, D. L. Batni, and H. G. Schulzrinne. ActiveCDN: Cloud computing meets content delivery networks. Columbia University, Technical Report, 2011.Google Scholar
- J. Thompson, P. Gusev, and J. Burke. NDN-CNL: A hierarchical namespace API for named data networking. In 6th ACM Conference on Information-Centric Networking, page 30--36, 2019.Google ScholarDigital Library
- Y. Yu, A. Afanasyev, D. Clark, K. Claffy, V.Jacobson, and L. Zhang. Schematizing trust in named data networking. In 2nd ACM Conference on Information-Centric Networking, pages 177--186, 2015.Google ScholarDigital Library
- L. Zhang, A. Afanasyev, J. Burke, V.Jacobson, k. claffy, P. Crowley, C. Papadopoulos, L. Wang, and B. Zhang. Named data networking. SIGCOMM Comput. Commun. Rev., 44(3):66--73, 2014.Google ScholarDigital Library
Index Terms
- Far Cry: Will CDNs Hear NDN's Call?
Recommendations
iCDN: An NDN-based CDN
ICN '20: Proceedings of the 7th ACM Conference on Information-Centric NetworkingDespite the close philosophy between content delivery networks (CDN) and named-data networks (NDN), no solution has realized a large-scale NDN-based CDN yet. In this paper, we void the popular belief that any NDN network can be expanded to serve as a ...
Revving up VNDN: Efficient caching and forwarding by expanding content popularity perspective and mobility
AbstractNetwork caching in Vehicular Named Data Networks (VNDN) has the potential to support latency-sensitive services, though given the massive amount of content generated by vehicles in a VNDN, it is challenging to cache sufficiently diverse content ...
Enabling Correct Interest Forwarding and Retransmissions in a Content Centric Network
ANCS '15: Proceedings of the Eleventh ACM/IEEE Symposium on Architectures for networking and communications systemsWe show that the mechanisms used in the name data networking (NDN) and the original content centric networking (CCN) architectures may not detect Interest loops, even if the network in which they operate is static and no faults occur. Furthermore, we ...
Comments