skip to main content
10.1145/2901378.2901398acmconferencesArticle/Chapter ViewAbstractPublication PagespadsConference Proceedingsconference-collections
short-paper

A Simulator for Distributed Cache Managementin Friend-to-Friend Networks

Published:15 May 2016Publication History

ABSTRACT

Multimedia streaming services such as YouTube and Netflix consume a staggering amount of Internet bandwidth [1]. Furthermore, traditional mechanisms such as proxy caches, content distribution networks, and redundant traffic elimination are rendered ineffective by copyright concerns, regulatory issues, and the growing prevalence of end-to-end encryption. One possible solution is a peer-to-peer caching system with social relationships at the core of its topology construction. A social topology carries an implicit level of trust, and induces a relatively high degree of correlation between users that can be exploited by the system as a whole. For example, two users with shared interests are more likely to have relevant videos in cache for each other. This short paper discusses the design of a simulator for such a system to provide insight into the performance of different cache management policies.

References

  1. V. Adhikari, Y. Guo, F. Hao, V. Hilt, Z. Zhang, M. Varvello, and M. Steiner. Measurement study of netflix, hulu, and a tale of three cdns. IEEE/ACM Transactions on Networking, 23(6):1984--1997, Dec 2015.Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. J. Armstrong. Erlang. Communications of the ACM, 53(9):68, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. A. Barabási and R. Albert. Statistical mechanics of complex networks. Reviews of Modern Physics, 74(January):48--94, 2002.Google ScholarGoogle Scholar
  4. B. Bloom. Space/time trade-offs in hash coding with allowable errors. Communications of the ACM, 13(7):422--426, 1970. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. I. Clarke, O. Sandberg, B. Wiley, and T. Hong. Freenet: A distributed anonymous information storage and retrieval system. Designing Privacy Enhancing Technologies., pages 46--66, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. F. Comellas, G. Fertin, and A. Raspaud. Recursive graphs with small-world scale-free properties. Physical Review E - Statistical, Nonlinear, and Soft Matter Physics, 69(3 2):2--5, 2004.Google ScholarGoogle Scholar
  7. M. Duggan and A. Smith. Social media update 2013. Pew Internet and American Life Project, 2013.Google ScholarGoogle Scholar
  8. P. Erdös and A. Rényi. On random graphs. Publicationes Mathematicae, 6:290--297, 1959.Google ScholarGoogle ScholarCross RefCross Ref
  9. P. Erdos and A. Renyi. The evolution of random graphs. Publ. Math. Inst. Hungar. Acad. Sci, 5(1):17, 1961.Google ScholarGoogle Scholar
  10. M. Laterman.textitNetFlix and Twitch Traffic Characterization. Master's thesis, University of Calgary, 2015.Google ScholarGoogle Scholar
  11. P. L'Ecuyer and R. Simard. TestU01: A c Library for empirical testing of random number generators. ACM Transactions on Mathematical Software, 33(4), 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Q. Telesford, K. Joyce, S. Hayasaka, J. Burdette, and P. Laurienti. The Ubiquity of Small-World Networks. Brain Connectivity, 1(5):367--375, Dec. 2011.Google ScholarGoogle ScholarCross RefCross Ref
  13. D. Watts and S. Strogatz. Collective dynamics of 'small-world' networks. Nature, 393(6684):440--2, 1998.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. A Simulator for Distributed Cache Managementin Friend-to-Friend Networks

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            SIGSIM-PADS '16: Proceedings of the 2016 ACM SIGSIM Conference on Principles of Advanced Discrete Simulation
            May 2016
            272 pages
            ISBN:9781450337427
            DOI:10.1145/2901378

            Copyright © 2016 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 15 May 2016

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • short-paper

            Acceptance Rates

            Overall Acceptance Rate398of779submissions,51%
          • Article Metrics

            • Downloads (Last 12 months)3
            • Downloads (Last 6 weeks)0

            Other Metrics

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader