Boosting the Performance of Content Centric Networking Using Delay Tolerant Networking Mechanisms

Hasan M.A. Islam*, Dimitris Chatzopoulos, Dmitrij Lagutin, Pan Hui, Antti Yla-Jaaski

*Corresponding author for this work

Research output: Contribution to journalArticleScientificpeer-review

5 Citations (Scopus)
229 Downloads (Pure)

Abstract

Content-centric networking (CCN) introduces a paradigm shift from a host centric to an information centric communication model for future Internet architectures. It supports the retrieval of a particular content regardless of the physical location of the content. Content caching and content delivery networks are the most popular approaches to deal with the inherent issues of content delivery on the Internet that are caused by its design. Moreover, intermittently connected mobile environments or disruptive networks present a significant challenge to CCN deployment. In this paper, we consider the possibility of using mobile users in improving the efficiency of content delivery. Mobile users are producing a significant fraction of the total Internet traffic, and modern mobile devices have enough storage to cache the downloaded content that may interest other mobile users for a short period too. We present an analytical model of the CCN framework that integrates a delay tolerant networking architecture into the native CCN, and we present large-scale simulation results. Caching on mobile devices can improve the content retrieval time by more than 50%, while the fraction of the requests that are delivered from other mobile devices can be more than 75% in many cases.

Original languageEnglish
Article number8078184
Pages (from-to)23858-23870
Number of pages13
JournalIEEE Access
Volume5
DOIs
Publication statusPublished - 20 Oct 2017
MoE publication typeA1 Journal article-refereed

Keywords

  • ad hoc networks
  • Communication technology
  • computer networks
  • heterogeneous network

Fingerprint Dive into the research topics of 'Boosting the Performance of Content Centric Networking Using Delay Tolerant Networking Mechanisms'. Together they form a unique fingerprint.

Cite this