for information centric networking icn
play

for Information Centric Networking (ICN) Lorenzo Saino, Ioannis - PowerPoint PPT Presentation

Icarus: a Caching Simulator for Information Centric Networking (ICN) Lorenzo Saino, Ioannis Psaras and George Pavlou Communications and Information Systems Group Department of Electronic and Electrical Engineering University College London


  1. Icarus: a Caching Simulator for Information Centric Networking (ICN) Lorenzo Saino, Ioannis Psaras and George Pavlou Communications and Information Systems Group Department of Electronic and Electrical Engineering University College London http://icarus-sim.github.io

  2. Outline • Background and motivation – Information Centric Networking (ICN) – Evaluating caching performance • Icarus simulator – Architecture and design – Modelling tools – Performance evaluation • Summary and conclusions

  3. Information Centric Networking (ICN)

  4. Information Centric Networking (ICN) ICN is a recently proposed networking paradigm proposing a shift of the main network abstraction from node identifiers to location-agnostic content identifiers.

  5. Information Centric Networking (ICN) ICN is a recently proposed networking paradigm proposing a shift of the main network abstraction from node identifiers to location-agnostic content identifiers. Several implementations proposed so far: CCN/NDN, NetInf, PSIRP/PURSUIT, COMET, MobilityFirst

  6. Information Centric Networking (ICN) ICN is a recently proposed networking paradigm proposing a shift of the main network abstraction from node identifiers to location-agnostic content identifiers. Several implementations proposed so far: CCN/NDN, NetInf, PSIRP/PURSUIT, COMET, MobilityFirst Main principles: • Request-response model • Location-agnostic content addressing • Secure the content, not the channel • In-network caching

  7. Overlay vs. In-Network Caching Important to understand: “What are the differences between overlay and in- network caching?”

  8. Overlay vs. In-Network Caching Important to understand: “What are the differences between overlay and in- network caching?” • Caching at the chunk-level not at the file-level (probably not at the packet level either) – As contents pass through router- caches they replace existing “old” contents – Caching can happen transparently into the network at random or predefined (rendezvous) points

  9. Overlay vs. In-Network Caching Important to understand: “What are the differences between overlay and in- network caching?” • Caching at the chunk-level not at the file-level (probably not at the packet level either) – As contents pass through router- caches they replace existing “old” contents – Caching can happen transparently into the network at random or predefined (rendezvous) points • Replacement happens at line-speed – what does this imply? – Overlay caching depends on centralised (control-plane) co-ordination and management of caches (or de-centralised among very few nodes) – In-network caching does not.

  10. Overlay vs. In-Network Caching Important to understand: “What are the differences between overlay and in- network caching?” • Caching at the chunk-level not at the file-level (probably not at the packet level either) – As contents pass through router- caches they replace existing “old” contents – Caching can happen transparently into the network at random or predefined (rendezvous) points • Replacement happens at line-speed – what does this imply? – Overlay caching depends on centralised (control-plane) co-ordination and management of caches (or de-centralised among very few nodes) – In-network caching does not. • Hence: no book-keeping possible – Impossible to co-ordinate with other caches, or the control plane – the exact location of contents cannot be known – Caching operations happen transparently inside the network – Decentralized distribution and replacement of contents in caches

  11. Evaluating Caching Performance

  12. Evaluating Caching Performance Requirements:

  13. Evaluating Caching Performance Requirements: • Large realistic topologies

  14. Evaluating Caching Performance Requirements: • Large realistic topologies • Many content requests to allow caches to reach steady-state

  15. Evaluating Caching Performance Requirements: • Large realistic topologies • Many content requests to allow caches to reach steady-state • Trace-driven simulations if possible

  16. Evaluating Caching Performance Requirements: • Large realistic topologies • Many content requests to allow caches to reach steady-state • Trace-driven simulations if possible Many simulators and prototypes are available today for evaluating ICN designs but none are suitable for caching:

  17. Evaluating Caching Performance Requirements: • Large realistic topologies • Many content requests to allow caches to reach steady-state • Trace-driven simulations if possible Many simulators and prototypes are available today for evaluating ICN designs but none are suitable for caching: • Bound to a specific architecture

  18. Evaluating Caching Performance Requirements: • Large realistic topologies • Many content requests to allow caches to reach steady-state • Trace-driven simulations if possible Many simulators and prototypes are available today for evaluating ICN designs but none are suitable for caching: • Bound to a specific architecture • Poor scalability

  19. Evaluating Caching Performance Requirements: • Large realistic topologies • Many content requests to allow caches to reach steady-state • Trace-driven simulations if possible Many simulators and prototypes are available today for evaluating ICN designs but none are suitable for caching: • Bound to a specific architecture • Poor scalability • Inability to run trace-driven simulations

  20. Evaluating Caching Performance Requirements: • Large realistic topologies • Many content requests to allow caches to reach steady-state • Trace-driven simulations if possible Many simulators and prototypes are available today for evaluating ICN designs but none are suitable for caching: • Bound to a specific architecture • Poor scalability • Inability to run trace-driven simulations Scarce availability of open-source implementations of modelling tools for network caching research.

  21. Icarus simulator

  22. Icarus simulator Python-based discrete-event simulator designed for evaluating the performance of: • Caching and routing strategies • Cache replacement policies

  23. Icarus simulator Python-based discrete-event simulator designed for evaluating the performance of: • Caching and routing strategies • Cache replacement policies Non-functional requirements: • Extensibility • Scalability

  24. Achieving extensibility

  25. Achieving extensibility • Plug-in registration system and extensive use of bridge pattern to provide loose-coupling @register_cache_policy('FOO') # config class FooCache (Cache) . . def get(self, k): POLICIES = [ ‘LRU‘ , 'FOO‘ ] ... . . def put(self, k): . ...

  26. Achieving extensibility • Plug-in registration system and extensive use of bridge pattern to provide loose-coupling • Support for fnss and networkx tools @register_cache_policy('FOO') # config class FooCache (Cache) . . def get(self, k): POLICIES = [ ‘LRU‘ , 'FOO‘ ] ... . . def put(self, k): . ...

  27. Achieving scalability

  28. Achieving scalability • Flow-level abstraction

  29. Achieving scalability • Flow-level abstraction • Parallel execution of experiments

  30. Achieving scalability • Flow-level abstraction • Parallel execution of experiments • Minimized disk access during experiment execution

  31. Architecture and design

  32. Architecture and design Code organized in four loosely-coupled subsystems:

  33. Architecture and design Code organized in four loosely-coupled subsystems: • Orchestration

  34. Architecture and design Code organized in four loosely-coupled subsystems: • Orchestration • Scenario generation

  35. Architecture and design Code organized in four loosely-coupled subsystems: • Orchestration • Scenario generation • Execution

  36. Architecture and design Code organized in four loosely-coupled subsystems: • Orchestration • Scenario generation • Execution • Results collection and analysis

  37. Orchestration conf settings results scenario orchestration results topology events topology results events settings execution

  38. Scenario generation conf settings results scenario orchestration results topology events topology results events settings execution

  39. Scenario generation data settings content placement topology topology factory cache placement topology parser trace event events generator Zipf Distr settings

  40. Execution conf settings results scenario orchestration results topology events topology results events settings execution

  41. Execution

  42. Execution settings topology events Engine

  43. Execution settings topology events Engine Strategy

  44. Execution settings topology events Engine Strategy Network Network View Controller Network Model

  45. Execution settings topology events events Engine Strategy Network Network View Controller Network Model

  46. Execution settings topology events events Engine Strategy Network Network View Controller Network Model

  47. Execution settings topology events events Engine Strategy Network Network View Controller Network Model

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend