2016
DOI: 10.48550/arxiv.1602.05853
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

XBF: Scaling up Bloom-filter-based Source Routing

Abstract: A well known drawback of IP-multicast is that it requires per-group state to be stored in the routers. Bloom-filter based source-routed multicast remedies this problem by moving the state from the routers to the packets. However, a fixed sized Bloom-filter can only store a limited number of items before the false positive ratio grows too high implying scalability issues. Several proposals have tried to address these scalability issues in Bloom-filter forwarding. These proposals, however, unnecessarily increase… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(4 citation statements)
references
References 24 publications
0
4
0
Order By: Relevance
“…As an alternative to namebased flooding, location-based solutions that exploit the geographic coordinates of nodes are also investigated, primarily in the context of vehicular networks [26] and recently in IoT systems [27]. To improve the scalability of forwarding tables, solutions based on bloom filters are proposed in [28,29,30]. There exists also a class of routing protocols for ICN-IoT environments specifically designed for push-based traffic, such as that produced in case of alarms or status changes.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…As an alternative to namebased flooding, location-based solutions that exploit the geographic coordinates of nodes are also investigated, primarily in the context of vehicular networks [26] and recently in IoT systems [27]. To improve the scalability of forwarding tables, solutions based on bloom filters are proposed in [28,29,30]. There exists also a class of routing protocols for ICN-IoT environments specifically designed for push-based traffic, such as that produced in case of alarms or status changes.…”
Section: Related Workmentioning
confidence: 99%
“…If p receives a second Interest packet for the same content i of which the corresponding Data message is still missing, it adds the incoming "face" to the corresponding PIT entry (line 6). If the number of received Interests for the same content exceeds a certain retransmission threshold (i.e., ReTX threshold at line 7), p retransmits the first received Interest towards the node with the highest utility for that content (line [23][24][25][26][27][28][29][30][31][32][33][34]. It is important to observe that if the selected forwarder is not currently in proximity of node p (i.e., the forwarder is not a neighbour of node p), the retransmission is delayed till the next contact.…”
Section: Single-path Mechanismmentioning
confidence: 99%
See 2 more Smart Citations