Pro-Diluvian: Understanding scoped-flooding for content discovery in information-centric networking

Liang Wang, Suzan Bayhan, Jörg Ott, Jussi Kangasharju, Arjuna Sathiaseelan, Jon Crowcroft

Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

40 Citations (Scopus)


Scoped-flooding is a technique for content discovery in a broad networking context. This paper investigates the effects of scoped-flooding on various topologies in informationcentric networking. Using the proposed ring model, we show that flooding can be constrained within a very small neighbourhood to achieve most of the gains which come from areas where the growth rate is relatively low, i.e., the network edge. We also study two flooding strategies and compare their behaviours. Given that caching schemes favour more popular items in competition for cache space, popular items are expected to be stored in diverse parts of the network compared to the less popular items. We propose to exploit the resulting divergence in availability along with the routers' topological properties to fine tune the flooding radius. Our results shed light on designing efficient content discovery mechanism for future information-centric networks.

Original languageEnglish
Title of host publicationICN 2015 - Proceedings of the 2nd International Conference on Information-Centric Networking
Number of pages10
ISBN (Electronic)9781450338554
Publication statusPublished - 30 Sep 2015
MoE publication typeA4 Article in a conference publication
EventACM Conference on Information-Centric Networking - San Francisco, United States
Duration: 30 Sep 20152 Oct 2015
Conference number: 2


ConferenceACM Conference on Information-Centric Networking
Abbreviated titleICN
Country/TerritoryUnited States
CitySan Francisco


  • Content Discovery
  • Graph Theory
  • Information-Centric Networking
  • Optimisation
  • Scoped-flooding


Dive into the research topics of 'Pro-Diluvian: Understanding scoped-flooding for content discovery in information-centric networking'. Together they form a unique fingerprint.

Cite this