Efficient User-Assisted Content Distribution over Information-Centric Network

  • HyunYong Lee
  • Akihiro Nakao
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7289)


To solve the fundamental limitations of current Internet in supporting today’s content-oriented services, information-centric networking (ICN) concept has been proposed. ICN has attractive features (e.g., name-based routing, in-network caching and multicast) supporting efficient content-oriented services. However, the attractive features may not be fully utilized by all existing contents due to the resources limitation, which means additional technique may be required for improving content-oriented services. In this paper, as one possible way for this, we examine P2P technique exploiting user resources in ICN. We first examine how P2P looks like in ICN. Then, we introduce the contribution-aware ICN and corresponding incentive mechanism to utilize the user resources efficiently. We also show how the contribution-aware ICN can be implemented over the existing ICN architectures. Through simulations, we evaluate an effect of user participation on the content distribution performance in ICN. We also verify the feasibility of the contribution-aware ICN in terms of resources utilization efficiency.


Information-centric networking user-assisted content distribution P2P incentive mechanism 


  1. 1.
  2. 2.
    Koponen, T., Chawla, M., Chun, B.-G., Ermolinskiy, A., Kim, K.H., Shenker, S., Stoica, I.: A data-oriented (and beyond) network architecture. In: Proc. of ACM SIGCOMM (2007)Google Scholar
  3. 3.
    Jacobson, V., Smetters, D.K., Thornton, J.D., Plass, M.F., Briggs, N.H., Braynard, R.L.: Networking named content. In: Proc. of ACM CoNEXT (2009)Google Scholar
  4. 4.
    Named Data Networking (NDN) project website,
  5. 5.
    PSIRP project website,
  6. 6.
    PURSUIT project website,
  7. 7.
    4WARD project website,
  8. 8.
    SAIL project website,
  9. 9.
    Stutzbach, D., Rejaie, R.: Understanding churn in peer-to-peer networks. In: Proc. of ACM IMC (2006)Google Scholar
  10. 10.
    Karagiannis, T., Papagiannaki, D., Faloutsos, M.: Should internet service providers fear peer-assisted content distribution? In: Proc. of ACM IMC (2005)Google Scholar
  11. 11.
    Hoffman, K., Zage, D., Rotaru, C.N.: A survey of attack and defense techniques for reputation systems. ACM Computing Surveys 42(1) (2009)Google Scholar
  12. 12.
    Karakaya, M., Korpeoglu, I., Ulusoy, O.: Free riding in peer-to-peer networks. IEEE Internet Computing 13, 92–98 (2009)CrossRefGoogle Scholar
  13. 13.
    The Network Simulator ns-2,

Copyright information

© IFIP International Federation for Information Processing 2012

Authors and Affiliations

  • HyunYong Lee
    • 1
  • Akihiro Nakao
    • 1
  1. 1.The University of TokyoMeguro-kuJapan

Personalised recommendations