skip to main content
10.1145/3623565.3623717acmconferencesArticle/Chapter ViewAbstractPublication PagescommConference Proceedingsconference-collections
research-article

Reining in Redundant Traffic through Adaptive Duplicate Suppression in Multi-Access NDN Networks

Published:08 October 2023Publication History

ABSTRACT

Named Data Networking (NDN) provides native support for multi-party communication. However, the current NDN forwarder lacks a duplicate suppression mechanism for multicasting in a multi-access network, potentially leading to network congestion and significant degradation in overall packet delivery performance. In this paper, we introduce Adaptive Duplicate Suppression (ADS) for one-hop multicasting in multi-access NDN networks. ADS utilizes the duplicate count per Interest and Data name observed in the network to dynamically adjust the suppression time that a node waits before forwarding a packet. We have implemented ADS in the NDN forwarding daemon (NFD) and assessed its performance using Mini-NDN. Our evaluation demonstrates that ADS can effectively reduce redundant network traffic under various network conditions, resulting in significantly improved application goodput and reduced transfer times.

References

  1. Amadeo, M., Camfolo, C., and Molinaro, A. Forwarding strategies in named data wireless ad hoc networks: Design and evaluation. Journal of Network and Computer Applications 50 (2015), 148--158.Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Amadeo, M., Camfolo, C., Molinaro, A., and Mitton, N. Named data networking: A natural design for data collection in wireless sensor networks. In 2013 IFIP wireless days (WD) (2013), IEEE, pp. 1--6.Google ScholarGoogle Scholar
  3. Amadeo, Marica and Camfolo, Claudia and Molinaro, Antonella. Multi-source data retrieval in iot via named data networking. In Proceedings of the 1st ACM Conference on Information-Centric Networking (2014), ACM, pp. 67--76.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Bouk, S.H., Ahmed, S.H., Park, K.-J., and Eun, Y. Interest broadcast suppression scheme for named data wireless sensor networks. IEEE Access 7 (2019), 51799--51809.Google ScholarGoogle ScholarCross RefCross Ref
  5. Chowdhury, M., Khan, J. A., and Wang, L. Leveraging content connectivity and location awareness for adaptive forwarding in ndn-based mobile ad hoc networks. In Proceedings of the 7th ACM Conference on Information-Centric Networking (2020), pp. 59--69.Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Dulal, S. NDNSD: Service publishing and discovery in NDN. University of Memphis Thesis (2020).Google ScholarGoogle Scholar
  7. Dulal, S., Ali, N., Thieme, A. R., Yu, T., Liu, S., Regmi, S., Zhang, L., and Wang, L. Building a secure mhealth data sharing infrastructure over. In Proceedings of the 9th ACM Conference on Information-Centric Networking (2022), pp. 59--69.Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Dulal, S., and Wang, L. Adaptive duplicate suppression for multicasting in a multi-access ndn network. In Proceedings of the 9th ACM Conference on Information-Centric Networking (2022), pp. 156--158.Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Elbadry, M., Ye, F., and Milder, P. Opsel: optimal producer selection under data redundancy in wireless edge environments. In Proceedings of the 9th ACM Conference on Information-Centric Networking (2022), pp. 22--32.Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Fesehaye, D., and Wei, J. Snc: scalable ndn-based conferencing architecture. In 2014 IEEE 11th Consumer Communications and Networking Conference (CCNC) (2014), IEEE, pp. 872--880.Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Gao, S., Zhang, H., and Zhang, B. Energy efficient interest forwarding in ndn-based wireless sensor networks. Mobile Information Systems 2016 (2016).Google ScholarGoogle Scholar
  12. Gummalla, A. C. V., and Limb, J. O. Wireless medium access control protocols. IEEE Communications Surveys & Tutorials 3, 2 (2000), 2--15.Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Hunter, J. S. The exponentially weighted moving average. Journal of quality technology 18, 4 (1986), 203--210.Google ScholarGoogle Scholar
  14. Li, M., Pei, D., Zhang, X., Zhang, B., and Xu, K. Interest-suppression-based ndn live video broadcasting over wireless lan. Frontiers of Computer Science 11, 4 (2017), 675--687.Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Liang, T., Shi, J., and Zhang, B. On the prefix granularity problem in ndn adaptive forwarding. In Proceedings of the 7th ACM Conference on Information-Centric Networking (2020), pp. 41--51.Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. NDN Project Team. ndn-cxx: NDN C++ library with eXperimental eXtensions. (Accessed on 06/10/2022).Google ScholarGoogle Scholar
  17. NDN Project Team. NDN Essential Tools. (Accessed on 08/13/2022).Google ScholarGoogle Scholar
  18. NDN Project Team. NFD: Named Data Networking Forwarding Daemon. (Accessed on 08/13/2022).Google ScholarGoogle Scholar
  19. NDN Project Team. Ip fragmentation causes ndncatchunks to time out indefinitely, 2020. Accessed: 2023-06-13.Google ScholarGoogle Scholar
  20. NDN Project Team. Mini-NDN - a lightweight NDN emulator, 2020. Accessed: 2022-08-13.Google ScholarGoogle Scholar
  21. Podder, P., Gupta, S. D., Neishaboori, A., and Afanasyev, A. sv2pc: On scaling lte-based vehicle-to-pedestrian communication using ndn. In NDN Community Meeting, NDNComm (2021), NIST.Google ScholarGoogle Scholar
  22. Yu, Y., Afanasyev, A., Clark, D., Jacobson, V., Zhang, L., et al. Schematizing Trust in Named Data Networking. In Proceedings of the 2nd International Conference on Information-Centric Networking (2015), ACM, pp. 177--186.Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Zhang, L., Afanasyev, A., Burke, J., Jacobson, V., Claffy, K., Crowley, P., Papadopoulos, C., Wang, L., and Zhang, B. Named data networking. ACM SIGCOMM Computer Communication Review 44, 3 (2014), 66--73.Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Reining in Redundant Traffic through Adaptive Duplicate Suppression in Multi-Access NDN Networks

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          ACM ICN '23: Proceedings of the 10th ACM Conference on Information-Centric Networking
          October 2023
          138 pages
          ISBN:9798400704031
          DOI:10.1145/3623565

          Copyright © 2023 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 8 October 2023

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          Overall Acceptance Rate133of482submissions,28%
        • Article Metrics

          • Downloads (Last 12 months)74
          • Downloads (Last 6 weeks)3

          Other Metrics

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader