skip to main content
10.1145/3357150.3357403acmconferencesArticle/Chapter ViewAbstractPublication PagescommConference Proceedingsconference-collections
research-article

Towards Peer-to-Peer Content Retrieval Markets: Enhancing IPFS with ICN

Published:24 September 2019Publication History

ABSTRACT

In the current Internet, content delivery, e.g., video-on-demand (VoD), at scale is associated with a large distributed infrastructure which requires considerable investment. Content Providers (CPs) typically resort to third-party Content Distribution Networks (CDNs) or build their own expensive content delivery infrastructure in order to cope with the peak demand and maintain sufficient quality-of-service (QoS), while Internet Service Providers (ISPs) need to overprovision their networks. In this paper we take a first step towards designing a system that uses storage space of users as CDN caches and deliver content with sufficient (i.e., CDN-like) quality while rewarding users for their resource usage as in a content retrieval marketplace. As a possible candidate for such a system, we consider recent P2P storage and delivery systems that have adopted new mechanisms such as rewarding of useful work (e.g., storage) while ensuring fairness and accountability through cryptographic proofs. In this paper, we experiment with the popular Interplanetary File System (IPFS) and investigate its performance in delivering VoD content locally within an ISP. Our findings suggest that operating IPFS (operating on top of IP) has its performance limitations and complementing it with an ICN network layer can significantly improve the delivery quality. We then propose and compare several forwarding strategies for ICN which can efficiently route requests and balance the load between peers with limited uplink resources.

References

  1. 2018. Project CCNx. http://www.ccnx.org/.Google ScholarGoogle Scholar
  2. 2019. Big Buck Bunny. https://download.blender.org/peach/bigbuckbunny_movies/big_buck_bunny_480p_h264.movGoogle ScholarGoogle Scholar
  3. 2019. Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update, 2016-2021 (White Paper). (May 2019). https://www.cisco.com/c/en/us/solutions/collateral/service-provider/visual-networking-index-vni/white-paper-c11-738429.htmlGoogle ScholarGoogle Scholar
  4. 2019. Global Internet Phenomena Report: Asia-Pacific and Europe. (May 2019). https://www.sandvine.com/press-releases/blog/sandvine-over-70-of-north-american-traffic-is-now-streaming-video-and-audioGoogle ScholarGoogle Scholar
  5. 2019. ndn-cxx: NDN C++ library with eXperimental eXtensions. Version 0.6.6. https://github.com/named-data/ndn-cxxGoogle ScholarGoogle Scholar
  6. 2019. NFD -Named Data Networking Forwarding Daemon. Version 0.6.6. https://github.com/named-data/NFDGoogle ScholarGoogle Scholar
  7. 2019. ns-3 | a discrete-event network simulator for internet systems. https://www.nsnam.org/Google ScholarGoogle Scholar
  8. 2019. NS3 Docker Emulator. https://chepeftw.github.io/NS3DockerEmulator/Google ScholarGoogle Scholar
  9. 2019. Presentation at Joint iCore and CommNet2 Workshop 2017: Content Caching and Distributed Storage for Future Communication Networks. (May 2019). https://commnet.ac.uk/wp-content/uploads/2017/06/Richard-Bradbury-The-scalability-challenge-for-broadcasting-on-the-Internet.pdfGoogle ScholarGoogle Scholar
  10. 2019. Which broadband has the fastest upload speeds? (May 2019). https://www.broadbandchoices.co.uk/ask-our-expert/which-broadband-has-the-best-upload-speedsGoogle ScholarGoogle Scholar
  11. Alexander Afanasyev, Xiaoke Jiang, Yingdi Yu, Jiewen Tan, Yumin Xia, Allison Mankin, and Lixia Zhang. 2017. NDNS: A DNS-like name service for NDN. In 2017 26th International Conference on Computer Communication and Networks (ICCCN). IEEE, 1--9.Google ScholarGoogle ScholarCross RefCross Ref
  12. Alexander Afanasyev, Junxiao Shi, Beichuan Zhang, Lixia Zhang, Ilya Moiseenko, Yingdi Yu, Wentao Shang, Yanbiao Li, Spyridon Mastorakis, Yi Huang, Jerald Paul Abraham, Steve DiBenedetto, Chengyu Fan, Christos Papadopoulos, Davide Pesavento, Giulio Grassi, Giovanni Pau, Hang Zhang, Tian Song, Haowei Yuan, Hila Ben Abraham, Patrick Crowley, Syed Obaid Amin, Vince Lehman, and Lan Wang. 2015. NFD Developer's Guide. Technical Report NDN-0021, Revision 4. NDN. http://named-data.net/techreports.htmlGoogle ScholarGoogle Scholar
  13. Alexander Afanasyev, Cheng Yi, Lan Wang, Beichuan Zhang, and Lixia Zhang. 2015. SNAMP: Secure name space mapping to scale NDN forwarding. In Computer Communications Workshops (INFOCOM WKSHPS), 2015 IEEE Conference on. IEEE.Google ScholarGoogle ScholarCross RefCross Ref
  14. J. Arkko, B. Trammell, M. Nottingham, C. Huitema, M. Thomson, J. Tantsura, and N. ten Oever. [n. d.]. Considerations on Internet Consolidation and the Internet Architecture. Internet-Draft draft-arkko-iab-internet-consolidation-01. Internet Engineering Task Force. https://datatracker.ietf.org/doc/html/draft-arkko-iab-internet-consolidation-01 Work in Progress.Google ScholarGoogle Scholar
  15. Onur Ascigil, Sergi Rene, Ioannis Psaras, and George Pavlou. 2018. On-demand routing for scalable name-based forwarding. In Proceedings of the 5th ACM Conference on Information-Centric Networking. ACM, 67--76.Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Onur Ascigil, Vasilis Sourlas, Ioannis Psaras, and George Pavlou. 2017. A native content discovery mechanism for the information-centric networks. In Proceedings of the 4th ACM Conference on Information-Centric Networking. ACM, 145--155.Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Juan Benet. 2014. Ipfs-content addressed, versioned, p2p file system. arXiv preprint arXiv:1407.3561 (2014).Google ScholarGoogle Scholar
  18. Juan Benet, David Dalrymple, and Nicola Greco. 2018. Proof of replication. Technical Report. Technical report, Protocol Labs, July 27, 2017. https://filecoin. io/proof-of-replication. pdf. Accessed June.Google ScholarGoogle Scholar
  19. Weibo Chu, Lifang Wang, Haiyong Xie, Zhi-Li Zhang, and Zejun Jiang. 2016. Network delay guarantee for differentiated services in content-centric networking. Computer Communications 76 (2016), 54--66. https://doi.org/10.1016/j.comcom.2015.09.009Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Bernhard Debatin, Jennette P Lovejoy, Ann-Kathrin Horn, and Brittany N Hughes. 2009. Facebook and online privacy: Attitudes, behaviors, and unintended consequences. Journal of computer-mediated communication 15, 1 (2009), 83--108.Google ScholarGoogle ScholarCross RefCross Ref
  21. Stefan Dziembowski, Lisa Eckey, and Sebastian Faust. 2018. FairSwap: How to fairly exchange digital goods. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. ACM, 967--984.Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Michael J. Freedman, Eric Freudenthal, and David Mazières. 2004. Democratizing Content Publication with Coral. In Proceedings of the 1st Conference on Symposium on Networked Systems Design and Implementation - Volume 1 (NSDI'04). USENIX Association, Berkeley, CA, USA, 18--18. http://dl.acm.org/citation.cfm?id=1251175.1251193Google ScholarGoogle Scholar
  23. April Glaser. 2018. How Apple and Amazon Are Aiding Chinese Censors.Google ScholarGoogle Scholar
  24. Anil Jangam, Prakash Suthar, and Milan Stolic. 2019. Supporting QoS aware Data Delivery in Information Centric Networks - draft-anilj-icnrg-icn-qos-00. Technical Report. Internet Engineering Task Force. https://tools.ietf.org/html/draft-anilj-icnrg-icn-qos-00 Work in Progress.Google ScholarGoogle Scholar
  25. Michał Król, Alberto Sonnino, Mustafa Al-Bassam, Argyrios Tasiopoulos, and Ioannis Psaras. 2019. Proof-of-Prestige A Useful Work Reward System for Unverifiable Tasks. In Proceedings of the 1st International Conference on Blockchain and Cryptocurrency. IEEE.Google ScholarGoogle ScholarCross RefCross Ref
  26. Sailesh Kumar, Jonathan Turner, and John Williams. 2006. Advanced algorithms for fast and scalable deep packet inspection. In 2006 Symposium on Architecture For Networking And Communications Systems. IEEE, 81--92.Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Protocol Labs. [n. d.]. Filecoin: A Decentralized Storage Network, https://filecoin.io/filecoin.pdf. ([n. d.]).Google ScholarGoogle Scholar
  28. Storj Labs. 2019. Storj Whitepaper. Technical Report. Storj Labs. https://storj.io/whitepaper/Google ScholarGoogle Scholar
  29. MaidSafe.net. 2019. MaidSafe Whitepaper. Technical Report. MaidSafe.net. https://github.com/maidsafe/WhitepapersGoogle ScholarGoogle Scholar
  30. Sergio Marti and Hector Garcia-Molina. 2006. Taxonomy of trust: Categorizing P2P reputation systems. Computer Networks 50, 4 (2006), 472 - 484. https://doi.org/10.1016/j.comnet.2005.07.011 Management in Peer-to-Peer Systems.Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Spyridon Mastorakis, Alexander Afanasyev, Yingdi Yu, and Lixia Zhang. 2017. ntorrent: Peer-to-peer file sharing in named data networking. In 2017 26th International Conference on Computer Communication and Networks (ICCCN). IEEE, 1--10.Google ScholarGoogle ScholarCross RefCross Ref
  32. Petar Maymounkov and David Mazieres. 2002. Kademlia: A peer-to-peer information system based on the xor metric. In International Workshop on Peer-to-Peer Systems. Springer, 53--65.Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Ilya Moiseenko. 2014. Fetching content in Named Data Networking with embedded manifests. Technical Report.Google ScholarGoogle Scholar
  34. Satoshi Nakamoto. 2008. Bitcoin: A peer-to-peer electronic cash system. (2008).Google ScholarGoogle Scholar
  35. Gianfranco Nencioni, Nishanth Sastry, Gareth Tyson, Vijay Badrinarayanan, Dmytro Karamshuk, Jigna Chandaria, Jon Crowcroft, Gianfranco Nencioni, Nishanth Sastry, Gareth Tyson, et al. 2016. SCORE: Exploiting global broadcasts to create offline personal channels for on-demand access. IEEE/ACM Transactions on Networking (TON) 24, 4 (2016), 2429--2442.Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Ingmar Poese, Benjamin Frank, Georgios Smaragdakis, Steve Uhlig, Anja Feldmann, and Bruce Maggs. 2012. Content-aware Traffic Engineering. (2012).Google ScholarGoogle Scholar
  37. I. Psaras, L. Saino, M. Arumaithurai, K. K. Ramakrishnan, and G. Pavlou. 2014. Name-based replication priorities in disaster cases. In 2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS). 434--439. https://doi.org/10.1109/INFCOMW.2014.6849271Google ScholarGoogle ScholarCross RefCross Ref
  38. Lorenzo Saino, Ioannis Psaras, and George Pavlou. 2014. Icarus: a Caching Simulator for Information Centric Networking (ICN). In Proceedings of the 7th International ICST Conference on Simulation Tools and Techniques (SIMUTOOLS '14). ICST, ICST, Brussels, Belgium, Belgium, 10.Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. Vasilis Sourlas, Onur Ascigil, Ioannis Psaras, and George Pavlou. 2018. Enhancing information resilience in disruptive information-centric networks. IEEE Transactions on Network and Service Management 15, 2 (2018), 746--760.Google ScholarGoogle ScholarCross RefCross Ref
  40. Kyoungwon Suh, Christophe Diot, Jim Kurose, Laurent Massoulie, Christoph Neumann, Don Towsley, and Matteo Varvello. 2007. Push-to-peer video-on-demand system: Design and evaluation. IEEE Journal on Selected Areas in Communications 25, 9 (2007).Google ScholarGoogle Scholar
  41. Jake Swearingen. 2018. http://nymag.com/selectall/2018/03/when-amazon-web-services-goes-down-so-does-a-lot-of-the-web.html.Google ScholarGoogle Scholar
  42. Christian Tschudin and Christopher Wood. 2016. File-like icn collection (flic). Internet Engineering Task Force, Internet-Draft draft-tschudin-icnrg-flic-00 (2016).Google ScholarGoogle Scholar
  43. Cheng Yi, Alexander Afanasyev, Ilya Moiseenko, Lan Wang, Beichuan Zhang, and Lixia Zhang. 2013. A case for stateful forwarding plane. Computer Communications 36, 7 (2013), 779--791.Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. Yingdi Yu, Alexander Afanasyev, David Clark, Van Jacobson, Lixia Zhang, et al. 2015. Schematizing trust in named data networking. In Proceedings of the 2nd ACM Conference on Information-Centric Networking. ACM, 177--186.Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. Lixia Zhang, Deborah Estrin, Jeffrey Burke, Van Jacobson, James D Thornton, Diana K Smetters, Beichuan Zhang, Gene Tsudik, Dan Massey, Christos Papadopoulos, et al. 2010. Named data networking (ndn) project. Relatório Técnico NDN-0001, Xerox Palo Alto Research Center-PARC (2010).Google ScholarGoogle Scholar

Index Terms

  1. Towards Peer-to-Peer Content Retrieval Markets: Enhancing IPFS with ICN

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        ICN '19: Proceedings of the 6th ACM Conference on Information-Centric Networking
        September 2019
        187 pages
        ISBN:9781450369701
        DOI:10.1145/3357150

        Copyright © 2019 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 24 September 2019

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
        • Research
        • Refereed limited

        Acceptance Rates

        Overall Acceptance Rate133of482submissions,28%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader