Change search
ReferencesLink to record
Permanent link

Direct link
Name Resolution Information Distribution in NetInf
KTH, School of Information and Communication Technology (ICT).
KTH, School of Information and Communication Technology (ICT).
2015 (English)Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
Abstract [en]

Information-Centric Networking (ICN) is a different architecture from today's Internet, which is host-centric. In ICN, content is requested by the names of content objects instead of network or host addresses. This feature allows for a number of advantages, such as in-network caching and request aggregation. Network of Information (NetInf) is an ICN architecture. It is an overlay on TCP/IP, which translates content object names to locators or IP addresses. NetInf is designed to facilitate initial deployment and migration from today's networks to ICN.

In an ICN network, content can be cached at numerous locations giving a client the possibility to retrieve content from a number of available sources. In order to retrieve a content object, a client does a lookup in a Name Resolution Service (NRS) to resolve the content name into a set of locators where the content is stored. By distributing the location information of content objects from the NRS to NetInf nodes in the network the lookup time and overhead caused by the lookup messages can be reduced. Hence resulting in better end-user experience and more efficient network utilization. In this thesis, two methods to distribute location information of content objects in a NetInf network have been proposed and evaluated against a reference model where the location information is hosted centrally in an NRS. The effectiveness of the proposed methods has been evaluated by running simulations on a NetInf simulator (built on OMNeT++) that was built during the course of this project.

Evaluation results show that the proposed methods reduce the lookup/name resolution latency of content objects. The results also compare the overhead caused by each one of the proposed methods in terms of network utilization. We also show the results that the network topology has an impact on the effectiveness of the proposed methods and therefore is a factor that needs due consideration in deciding which method is suitable when.

Place, publisher, year, edition, pages
2015. , 57 p.
TRITA-ICT-EX, 2015:197
National Category
Computer and Information Science
URN: urn:nbn:se:kth:diva-186591OAI: diva2:927790
Available from: 2016-05-13 Created: 2016-05-13 Last updated: 2016-05-13Bibliographically approved

Open Access in DiVA

fulltext(4788 kB)38 downloads
File information
File name FULLTEXT01.pdfFile size 4788 kBChecksum SHA-512
Type fulltextMimetype application/pdf

By organisation
School of Information and Communication Technology (ICT)
Computer and Information Science

Search outside of DiVA

GoogleGoogle Scholar
Total: 38 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

Total: 115 hits
ReferencesLink to record
Permanent link

Direct link