Easy as ABC : A Lightweight Centrality-Based Caching Strategy for - - PowerPoint PPT Presentation

easy as abc a lightweight centrality based caching
SMART_READER_LITE
LIVE PREVIEW

Easy as ABC : A Lightweight Centrality-Based Caching Strategy for - - PowerPoint PPT Presentation

Easy as ABC : A Lightweight Centrality-Based Caching Strategy for Information-Centric IoT Jakob Pfender , Alvin Valera, Winston K. G. Seah 26 September 2019 School of Engineering and Computer Science Victoria University of Wellington


slide-1
SLIDE 1

Easy as ABC: A Lightweight Centrality-Based Caching Strategy for Information-Centric IoT

Jakob Pfender, Alvin Valera, Winston K. G. Seah 26 September 2019

School of Engineering and Computer Science Victoria University of Wellington

slide-2
SLIDE 2

Introduction & Motivation

slide-3
SLIDE 3

Caching in Information-Centric IoT

Benefjts

  • Fast information retrieval
  • Reduced congestion
  • Stability
  • Decentralisation

1

slide-4
SLIDE 4

Caching in Information-Centric IoT

Benefjts

  • Fast information retrieval
  • Reduced congestion
  • Stability
  • Decentralisation

Challenges

  • Limited memory
  • Limited processing power
  • Limited battery life
  • Limited bandwidth
  • Unreliable links

1

slide-5
SLIDE 5

Where should content be cached?

slide-6
SLIDE 6

Multihop Topology Types in IoT

Producer Relay Consumer

Core topology Edge topology

2

slide-7
SLIDE 7

Centrality-Based Caching Strategies

slide-8
SLIDE 8

Centrality-Based Caching Strategies

  • Use caching node’s betweenness

centrality to decide where to cache content

  • Betweenness centrality: The

number of times a given node lies

  • n one of the paths between all

pairs of nodes in the network

  • Centrality indicates node’s

importance in the network

3

slide-9
SLIDE 9

Centrality-Based Caching Strategies

CB(v) = ∑

i̸=v̸=j∈V

σ′

i,j(v), where

σ′

i,j(v) =

{ 1, if v on path (i, j) 0,

  • therwise.
  • Interest packets record maximum

CB(v) among nodes they encounter

  • Returning Data is cached at all nodes

whose CB(v) is equal to or greater than maximum

23 6 25 32 25 14 11

3

slide-10
SLIDE 10

Betw and EgoBetw

slide-11
SLIDE 11

Betw

  • Each node’s CB(v) is assigned

manually (a priori) or through exchange of neighbour information

  • For automatic assignment, every

node needs full information about every other node

  • Full recalculation required if

topology changes 0.21 0.1 0.23 0.29 0.23 0.13 0.1

4

slide-12
SLIDE 12

Betw

  • Signifjcant overhead:
  • Communication
  • Memory
  • Computation
  • Complexity:
  • Messaging:

O ( n2)

  • Memory:

O ( n2)

  • Computational: O

( n2)

  • Not feasible for constrained

networks 0.21 0.1 0.23 0.29 0.23 0.13 0.1

4

slide-13
SLIDE 13

EgoBetw

  • Distributed solution
  • Ego network: A node’s one-hop

neighbours and the links between them

  • Centrality is calculated only for

each node’s ego network

  • Approximates actual centrality

5

slide-14
SLIDE 14

EgoBetw

  • Distributed solution
  • Ego network: A node’s one-hop

neighbours and the links between them

  • Centrality is calculated only for

each node’s ego network

  • Approximates actual centrality

0.29 0.25 0.39 0.39 0.44 0.38 0.38

5

slide-15
SLIDE 15

Betw and EgoBetw — Comparison

0.21 0.1 0.23 0.29 0.23 0.13 0.1 0.29 0.25 0.39 0.39 0.44 0.38 0.38

6

slide-16
SLIDE 16

Betw and EgoBetw — Comparison

  • Loss of granularity between

absolute node centralities, but relative centralities mostly preserved

  • Reduced complexity
  • Messaging:

O (n)

  • Memory:

O ( d2) (d ≤ n − 1)

  • Computational: O

( d2)

  • Dynamic topologies slightly easier

to manage 0.29 0.25 0.39 0.39 0.44 0.38 0.38

7

slide-17
SLIDE 17

Betw and EgoBetw — Summary

  • Betw is infeasible for constrained hardware
  • Existing research fjnds that EgoBetw delivers satisfactory approximation
  • But its overhead is still signifjcant!

8

slide-18
SLIDE 18

Our Goal

slide-19
SLIDE 19

Our Goal

Find a caching strategy that approximates the advantages of centrality-based caching while subject to the constraint that it must be feasible to implement and run on typical IoT hardware with extremely limited memory and processing power.

9

slide-20
SLIDE 20

Approximate Betweenness Centrality

slide-21
SLIDE 21

Approximate Betweenness Centrality (ABC)

  • Each node approximates its own

centrality during runtime

  • Using information piggy-backed
  • nto normal ICN packets
  • Interest packets are extended to

carry UID of original requesting node

10

slide-22
SLIDE 22

Approximate Betweenness Centrality (ABC)

  • Receiving an Interest means a node

knows it is on the path between producer and consumer

  • Each Interest from a new consumer
  • r to a new producer increases the

node’s knowledge

  • Over time, nodes can approximate

their own centrality 2 2 4 2 2

10

slide-23
SLIDE 23

Approximate Betweenness Centrality (ABC)

  • Receiving an Interest means a node

knows it is on the path between producer and consumer

  • Each Interest from a new consumer
  • r to a new producer increases the

node’s knowledge

  • Over time, nodes can approximate

their own centrality 2 2 4 2 2 2 1 3 4 6 5 5

10

slide-24
SLIDE 24

Approximate Betweenness Centrality (ABC)

  • Receiving an Interest means a node

knows it is on the path between producer and consumer

  • Each Interest from a new consumer
  • r to a new producer increases the

node’s knowledge

  • Over time, nodes can approximate

their own centrality 2 2 4 2 2 2 1 3 4 6 5 5 2 6 7 10 7 7

10

slide-25
SLIDE 25

Approximate Betweenness Centrality (ABC)

  • Introduces a convergence time

(≤ 60s), but gets rid of a priori setup phase

  • Signifjcantly reduced complexity:
  • Messaging:

O (1)

  • Memory:

O (p) (p ≤ n (n − 1))

  • Computational:

O (1)

  • Can handle dynamic topologies by

using time-outs

  • Centrality values refmect actual

traffjc patterns 2 2 4 2 2 2 1 3 4 6 5 5 2 6 7 10 7 7

10

slide-26
SLIDE 26

ABC — Complexity Comparison

Strategy Messaging overhead Memory overhead Computational overhead Betw O ( n2) O ( n2) O ( n2) EgoBetw O (n) O ( d2) O ( d2) ABC O (1) O (p) O (1)

d: Node degree (d ≤ n − 1) p: Number of paths (p ≤ n (n − 1)) 11

slide-27
SLIDE 27

Evaluation

slide-28
SLIDE 28

Evaluation — Experiment Setup

  • All experiments conducted on FIT

IoT-LAB open testbed using M3 nodes

  • STM32 (ARM Cortex M3), 512 kB

ROM, 64 kB RAM, Atmel AT86RF231 2.4 GHz transceiver on IEEE 802.15.4

  • Simple RIOT-OS application using

CCN-lite as ICN implementation, modifjed to support the difgerent caching strategies

  • Grenoble site:

380 M3 nodes distributed evenly in a single building, realistic indoor conditions (multipath, refmection, absorption, interference)

  • Choose 50 nodes randomly for each

experiment

  • Nodes can cache up to 5 objects

12

slide-29
SLIDE 29

Evaluation — Experiment Setup

  • All experiments conducted on FIT

IoT-LAB open testbed using M3 nodes

  • STM32 (ARM Cortex M3), 512 kB

ROM, 64 kB RAM, Atmel AT86RF231 2.4 GHz transceiver on IEEE 802.15.4

  • Simple RIOT-OS application using

CCN-lite as ICN implementation, modifjed to support the difgerent caching strategies

  • Grenoble site: ∼ 380 M3 nodes

distributed evenly in a single building, realistic indoor conditions (multipath, refmection, absorption, interference)

  • Choose 50 nodes randomly for each

experiment

  • Nodes can cache up to 5 objects

12

slide-30
SLIDE 30

Evaluation — Experiment Description

  • Build core and edge topologies

using routing algorithms and FIB assignment

  • All nodes act as producers,

consumers, and relays

  • Multihop setup, average path

length 3–4 hops

  • Every node periodically requests

content from producers following uniform distribution

  • Content is cached according to

selected caching strategy

  • Strategies evaluated: Cache

Everything Everywhere (CEE), Leave Copy Down (LCD), Betw, EgoBetw, ABC

13

slide-31
SLIDE 31

Evaluation — Experiment Description

  • Build core and edge topologies

using routing algorithms and FIB assignment

  • All nodes act as producers,

consumers, and relays

  • Multihop setup, average path

length 3–4 hops

  • Every node periodically requests

content from producers following uniform distribution

  • Content is cached according to

selected caching strategy

  • Strategies evaluated: Cache

Everything Everywhere (CEE), Leave Copy Down (LCD), Betw, EgoBetw, ABC

13

slide-32
SLIDE 32

Evaluation — Cache Hit Rate

CEE LCD ABC EgoBetw Betw 50 60 70 80 90 100 Cache hit rate, core topology

Core topology

CEE LCD ABC EgoBetw Betw 50 60 70 80 90 100 Cache hit rate, edge topology

Edge topology

14

slide-33
SLIDE 33

Evaluation — Hop Count Reduction

1 2 3 4 5

Distance to source (in hops)

1 2 3 4

Hops to hit Strategy

CEE LCD ABC EgoBetw Betw

Core topology

1 2 3 4 5

Distance to source (in hops)

1 2 3 4

Hops to hit Strategy

CEE LCD ABC EgoBetw Betw

Edge topology

15

slide-34
SLIDE 34

Evaluation — Latency Reduction

1 2 3 4 5

Distance to source (in hops)

10 20 30 40 50 60

Latency reduction (in ms) Strategy

CEE LCD ABC EgoBetw Betw

Core topology

1 2 3 4 5

Distance to source (in hops)

10 20 30 40 50 60

Latency reduction (in ms) Strategy

CEE LCD ABC EgoBetw Betw

Edge topology

16

slide-35
SLIDE 35

Conclusions

slide-36
SLIDE 36

Conclusions

  • Centrality strategies ofger

signifjcant benefjts for content delivery latency regardless of network topology

  • If the topology type is known &

static, other strategies may be

  • ptimal
  • Centrality strategies are a strong
  • ption if topology is unknown or

mutable

  • ABC not expected to outperform

existing centrality strategies because it relies on less accurate information

  • However, its complexity is

signifjcantly lower while results remain acceptable

  • It is viable to implement on

constrained devices and is consistent across topologies

17

slide-37
SLIDE 37

Conclusions

  • Centrality strategies ofger

signifjcant benefjts for content delivery latency regardless of network topology

  • If the topology type is known &

static, other strategies may be

  • ptimal
  • Centrality strategies are a strong
  • ption if topology is unknown or

mutable

  • ABC not expected to outperform

existing centrality strategies because it relies on less accurate information

  • However, its complexity is

signifjcantly lower while results remain acceptable

  • It is viable to implement on

constrained devices and is consistent across topologies

17

slide-38
SLIDE 38

Conclusions

  • Centrality strategies ofger

signifjcant benefjts for content delivery latency regardless of network topology

  • If the topology type is known &

static, other strategies may be

  • ptimal
  • Centrality strategies are a strong
  • ption if topology is unknown or

mutable

  • ABC not expected to outperform

existing centrality strategies because it relies on less accurate information

  • However, its complexity is

signifjcantly lower while results remain acceptable

  • It is viable to implement on

constrained devices and is consistent across topologies

17

slide-39
SLIDE 39

Conclusions

  • Centrality strategies ofger

signifjcant benefjts for content delivery latency regardless of network topology

  • If the topology type is known &

static, other strategies may be

  • ptimal
  • Centrality strategies are a strong
  • ption if topology is unknown or

mutable

  • ABC not expected to outperform

existing centrality strategies because it relies on less accurate information

  • However, its complexity is

signifjcantly lower while results remain acceptable

  • It is viable to implement on

constrained devices and is consistent across topologies

17

slide-40
SLIDE 40

Conclusions

  • Centrality strategies ofger

signifjcant benefjts for content delivery latency regardless of network topology

  • If the topology type is known &

static, other strategies may be

  • ptimal
  • Centrality strategies are a strong
  • ption if topology is unknown or

mutable

  • ABC not expected to outperform

existing centrality strategies because it relies on less accurate information

  • However, its complexity is

signifjcantly lower while results remain acceptable

  • It is viable to implement on

constrained devices and is consistent across topologies

17

slide-41
SLIDE 41

Conclusions

  • Centrality strategies ofger

signifjcant benefjts for content delivery latency regardless of network topology

  • If the topology type is known &

static, other strategies may be

  • ptimal
  • Centrality strategies are a strong
  • ption if topology is unknown or

mutable

  • ABC not expected to outperform

existing centrality strategies because it relies on less accurate information

  • However, its complexity is

signifjcantly lower while results remain acceptable

  • It is viable to implement on

constrained devices and is consistent across topologies

17

slide-42
SLIDE 42

Thank you!

Contact: jakob.pfender@ecs.vuw.ac.nz

slide-43
SLIDE 43

Classes of constrained devices

Class ROM RAM << 100 KiB << 10 KiB 1 ∼ 100 KiB ∼ 10 KiB 2 ∼ 250 KiB ∼ 50 KiB

(Bormann et al: Terminology for Constrained-Node Networks, 2014)

  • RIOT 4.4 kB
  • CCN-lite: 8.7 kB

19

slide-44
SLIDE 44

Issues & Caveats

slide-45
SLIDE 45

ABC — Issues & Caveats

  • Reliance on Interests that clearly

identify producer and consumer

  • Strong assumption: Singular

source for each prefjx

  • Break in ICN principles: Carrying

consumer information in Interest packets

  • Single source assumption not

generally true, but not unrealistic (uniquely identifjed sensor, rooms, etc.)

  • Can treat groups of nodes as one

producer for path counting purposes

  • Break with ICN principles

unproblematic if application is siloed, but may break interoperability and cannot provide anonymity

20

slide-46
SLIDE 46

ABC — Issues & Caveats

  • More central nodes are put under

more strain

  • Exacerbated by already having to

route more traffjc due to position in topology

  • May lead to failure of the most

important nodes in the network, thus defeating purpose

  • Potential solution: Ofg-path

caching

  • Offmoad content to less strained

neighbours

  • Can make use of centrality

0.21 0.1 0.23 0.29 0.23 0.13 0.1

21

slide-47
SLIDE 47

ABC — Issues & Caveats

  • More central nodes are put under

more strain

  • Exacerbated by already having to

route more traffjc due to position in topology

  • May lead to failure of the most

important nodes in the network, thus defeating purpose

  • Potential solution: Ofg-path

caching

  • Offmoad content to less strained

neighbours

  • Can make use of centrality

X X 0.21 0.1 0.23 0.29 0.23 0.13 0.1

21