On the Performance of General Cache Networks
Journal Title: EAI Endorsed Transactions on Cloud Systems - Year 2015, Vol 1, Issue 4
Abstract
The performance evaluation of cache networks has gain a huge attention due to content-oriented delivery technologies. If general network topologies are more realistic than hierarchical networks widely studied in the literature, their analysis is significantly challenging. Existing models mainly focus on trees where content custodians are located at the root and the one-way child-to-parent request forwarding schema is common. In this paper, we consider complex and irregular networks where requests may flow possibly in opposite directions from/to several sources/destinations. Moreover, we assume that caches may run one of Time-To-Live (TTL)-based policies recently introduced for content-centric networks and modern Domain Name System [5]. We then derive an analytical framework and a polynomial-time algorithm that approximate accurately performance metrics of arbitrary graph-based and heterogeneous TTL-based cache networks. Simulations show that our simplified methodology may accurately predict metrics of interest on networks of caches running popular replacement algorithms (e.g. LRU, FIFO, or Random) without restricting its scope of application to this interesting use case. Unlike existing approaches, ours scales as network and content catalog sizes increase.
Authors and Affiliations
Nicaise CHOUNGMO FOFACK, Mostafa DEHGHAN, Don TOWSLEY, Misha BADOV, Dennis L. GOECKEL
Indoor Positioning using cellular network and relay node for wearables
One of the key requirements in public safety domain is to know the exact location of user or wearable device. There are a plethora of Internet of Things based wearable devices which are getting used for geo-fencing and f...
Android Apps Security Evaluation System in the Cloud
It is an uncertain problem that evaluating the security of Android Apps. We can’t be sure of the danger with sensitive permissions in an individual of Apps. Permissions are an important factor in security decisions of Ap...
Towards a cloud consumers credibility assessment and trust management of cloud services
In Cloud computing, several issues arises due to malicious users. The cloud service provider does not know whether the cloud consumer is authorized user or an unauthorized user when they access the data from cloud. Cloud...
A Dynamic Self-adaptive Resource-Load Evaluation Method in Cloud Computing
Cloud resource and its load have dynamic characteristics. To address this challenge, a dynamic self-adaptive evaluation method (termed SDWM) is proposed in this paper. SDWM uses some dynamic evaluation indicators to eval...
Fighting packet storms in mobile networks with information-centrism
Mobile application development for smartphones is a trend in the telecommunications industry. However, their deployment is not seamless since many applications are not mobile network-friendly. A key problem that frequent...