2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) 2014
DOI: 10.1109/infcomw.2014.6849277
|View full text |Cite
|
Sign up to set email alerts
|

MAGIC: A distributed MAx-Gain In-network Caching strategy in information-centric networks

Abstract: Information centric networks (ICNs) allow content objects to be cached within the network, so as to provide efficient data delivery. Existing works on in-network caches mainly focus on minimizing the redundancy of caches to improve the cache hit ratio, which may not lead to significant bandwidth saving. On the other hand, it could result in too frequent caching operations, i.e., cache placement and replacement, causing more power consumption at nodes, which shall be avoided in energy-limited data delivery envi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
62
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 79 publications
(63 citation statements)
references
References 17 publications
1
62
0
Order By: Relevance
“…The deployment and location can be an influencing factor for bandwidth utilization, mitigating high hop crosses, minimizing traffic and overall network delay. Studies by Psaras et al (2014), Sourlas et al (2013) and Ren et al (2014) have identified the need for proxy, reverse proxy, active deployments of caches with each related to the localization of the cache-enabled node/router. Therefore, cache size would be efficiently utilized based on the deployment scheme and algorithm of placement, eviction or replacement of contents in ICN.…”
Section: Cache Size Vs Cache Locationmentioning
confidence: 99%
“…The deployment and location can be an influencing factor for bandwidth utilization, mitigating high hop crosses, minimizing traffic and overall network delay. Studies by Psaras et al (2014), Sourlas et al (2013) and Ren et al (2014) have identified the need for proxy, reverse proxy, active deployments of caches with each related to the localization of the cache-enabled node/router. Therefore, cache size would be efficiently utilized based on the deployment scheme and algorithm of placement, eviction or replacement of contents in ICN.…”
Section: Cache Size Vs Cache Locationmentioning
confidence: 99%
“…Especially, a lot of works focus on the design of new caching strategies, as it is a key point of this novel networking architecture [6][7][8][9]. However, these strategies are usually evaluated with dedicated simulation tools, under different simulation environments, scenarios and input parameters.…”
Section: Related Workmentioning
confidence: 99%
“…127 nodes) where all the requests are issued from the last two levels of the ISP and are served by the root node. [8] and [9] use the same kind of a k-ary tree ranging from 4 to 6 levels and the number of children per node varies between 2 and 5. [10] uses a mixed approach, where an ISP level topology is generated and a binary tree of depth 5 is built at each node of the ISP level topology.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations