Disjoint Path Discovery in CCN Networks
Asanga Udugama, Xinyi Zhang, Yasir Zaki, Carmelita Goerg (University of Bremen), Andreas Timm-Giel (Hamburg University of Technology)
8. G,6+!N'/E8?40)!
! B8T!3,()!K,6+/!,04!(44949`!!
! ;2G^PGa!!6T8!80!6+044!K,6+/!,04!
4(8D-+!VbWV=W!
< I8/6!8@!6+4!K40@803,(E4!!
'3K08?434(6/!E,(!C4!!,E+'4?49!T'6+!,!
@4T!K,6+/!VbW!
< I804!K,6+/!04UD'04/!3804!8?40+4,9!68!
E8(6085!V=W!
< P(E04,/4/!6+4!E83K54S'6)!8@!60,XE!
9'/60'CDJ8(!/E+434V=W!!
! 22La!/J55!,(!8K4(!'//D4!
! F(5)!E8(/'940!6T8!K,6+/!@80!
/'3K5'E'6)!
Impact of shared links on the end-to-end video quality:
! B8T!68!/454E6!6+4/4!K,6+/`!! Multiple Descriptions (MD, using two paths) distortion vs.
Single Description (SD, using single path) distortion as
! N45,)! the number of joint links between two paths varies. [12]
! N'?40/'6)!
< M4/8D0E4!,--04-,J8(!
< B'-+40!@,D56<68540,(E4!
8 !"#$%&'!
9. G,6+!N'/E8?40)
! I46+89/!a!!
! #c!L894<9'/O8'(6!K,6+/!
< Fd40!6+4!38/6!04/8D0E4!,--04-,J8(! Content
< Fd40!6+4!+'-+4/6!94-044!8@!@,D56<68540,(E4!
< ]4,/6!E8338(!
! =c!]'(1<9'/O8'(6!K,6+/!
< ]8T40!04/8D0E4!,--04-,J8(!6+,(!L894<
9'/O8'(6!K,6+/!
< ]8T40!94-044!8@!@,D56<68540,(E4!
< :!-889!E83K083'/4!C46T44(!L894<9'/O8'(6! Client
,(9!L8(<9'/O8'(6!K,6+/!
! bc!L8(<9'/O8'(6!K,6+/!
Four types of node-or link-Disjoint Paths between a
< ]8T4/6!04/8D0E4!,--04-,J8(! client-Content pair
< ]8T4/6!94-044!8@!@,D56<68540,(E4!
! A single link or node failure can cause
multiple paths to fail
< 2,(!C4!4,/'5)!9'/E8?4049!
9 !"#$%&'!
10. N'/E8?40!L894<9'/O8'(6!G,6+/
! ;+4!@D(9,34(6,5!22L!@80T,09'(-!/60,64-'4/!-D,0,(644!6+,6!)&,#"'&,
"*%,5"?8,"@,)*8,?1%5%,"@,.)&),+"%',"6%7,)*8,<1*:,
or
Fundamental CCN forwarding strategy aggregates duplicate Interests and suppresses duplicate Contents
! P@!E5'4(6!/4(9/!8D6!,(!P(6404/6!8?40!,55!@,E4/%!6+4!046D0('(-!28(64(6!
6+,6!Y(,55)!,00'?4/!,6!6+4!E5'4(6!E,(!8(5)!6,14!K,6+/!,/!@8558T/a!
!
(a) (b) (c) (d)
There are four kinds of multiple paths taken by the returning Content in response to path-discovery Interests
10 !"#$%&'!
11. N'/E8?40!L894<9'/O8'(6!G,6+/
! P(6404/6!K,E146/!E8(6,'(!,!0,(983!(8(E4!?,5D4!/8!6+,6!9DK5'E,64/!
04E4'?49!8?40!9'd404(6!K,6+/!3,)!C4!9'/E,0949!V#W!
! P(!38/6!E,/4/%!!6+4!/'6D,J8(!'(!E,/4!"9$!E8D59!C4!,?8'949!/'(E4!6+4!9DK5'E,64!
'(6404/6!T'55!C4!9'/E,0949!,6!6+4!!(894!8@!'(640/4EJ8(!!
! RSE4KJ8(a!!P@!6+404!,504,9)!4S'/6!GP;!4(60'4/!!'(!6+4!'(640349',64!(894/%!6+4!
046D0('(-!E8(64(6!3,)!6,14!(8(<9'/O8'(6!K,6+/!!!
! H85DJ8(a!!R?40)!J34!6+4!E8(64(6!K08?'940!/4(9/!8D6!,!E8(64(6!E+D(1!6+08D-+!,!!
!!!!!,(!'(640@,E4%!,e,E+!,!(8(E4!8(!6+4!E8(64(6c!
PIT entry
PIT entry
Once an Interest meets an existing PIT
entry, the returning Contents may take
overlapped routes
11 !"#$%&'!
14. N'/E8?40!]'(1<9'/O8'(6!G,6+/
! P(!K,6+!9'/E8?40)!/6,-4%!
! :e,E+!,!0,(983!(8(E4!,(9!,!f,-!68!6+4!'(6404/6! I
H
4?40)!J34!6+4!E5'4(6!/4(9!'6!8D6!6+08D-+!,(!
'(640@,E4!
! g+4(!6+4!'(640349',64!(894!04E4'?4/!,(!P(6404/6!
T'6+!,!f,-%!'6!T'55!
E F G
< P@!6+4!P(6404/6!T,/!(4?40!/44(!C4@804!h!E04,64!GP;!
4(60)!
< P@!6+4!P(6404/6!E,00'4/!,!9'd404(6!(8(E4!,(9!E834/!
@083!,!9'd404(6!@,E4!T'6+!6+4!'(6404/6/!K4(9'(-!
6+404!<<!57%)&%,),'%?)7)&%,3AB,%*&78,@"7,&4%,A*&%7%'&,, A B C D
< F6+40T'/4!<<!.1'5)7.,&4%,A*&%7%'&,
! R,E+!046D0('(-!28(64(6!E+D(1!E8(/D34/!8(5)!8(4!
GP;!4(60),CD7'&,57%)&%.,%*&78,1',5"*'/#%.,D7'&E!
< ;+4!/4E8(9!04E4'?49!28(64(6!E,(!E8(/D34!6+4!
/4E8(9!GP;!4(60)! client
! :(!P(640349',64!(894!T'55!/46!6+4!9'/E8?4049! Discover link-disjoint Paths
6T8!8D6-8'(-!@,E4/!,/!Z7889![,E4/!,(9!D/4!
6+43!68!945'?40!6+4!/DC/4UD4(6!P(6404/6/!
14 !"#$%&'!
15. P//D4/!8@!N'/E8?40'(-!N'/O8'(6!G,6+/!'(!22L
! ;+4!,5-80'6+3/!E,((86!-D,0,(644!6+,6!6+4!
9'/E8?4049!K,6+/!,04!#iij!9'/O8'(6!!
! :!E8(64(6!0460'4?49!C)!8(4!'(6404/6!3'-+6!C4!E,E+49!
,58(-!6+4!K,6+%!,(9!6+4(!C4!0460'4?49!,-,'(!C)!6+4! A
/,34!P(6404/6!@083!6+4!/,34!E5'4(6!!
< ;+4!E5'4(6!984/(k6!6,14!,!K,6+!T+'E+!+,/!5,0-4!945,)!
The algorithms cannot guarantee that the
! 28(/60,'('(-!6+4!/DC/4UD4(6!60,XE!8@!8(4! discovered paths are 100% disjoint
E5'4(6!68!6+4!9'/E8?4049!K,6+/!3,)C4!
E+,554(-'(-!
! ND0'(-!6+4!60,(/3'//'8(%!6+4!ZN'/E8?4049![,E4/!8@!
,(!'(640349',64!(894!E,(!E+,(-4!9D4!68!6+4!58E,5!
/60,64-)!5,)40!C4'(-!'(fD4(E49!C)!86+40!E5'4(6/! Discovered Face
It is challenging to constraint the
subsequent traffic of one client to the
discovered paths
15 !"#$%&'!