You are currently viewing a new version of our website. To view the old version click .
Sensors
  • Article
  • Open Access

8 February 2024

Provisioning of Fog Computing over Named-Data Networking in Dynamic Wireless Mesh Systems

,
,
,
,
,
,
,
,
and
1
Faculty of Information Technology and Communication Sciences, Tampere University, 33720 Tampere, Finland
2
Intel Labs, Portland, OR 97124, USA
*
Author to whom correspondence should be addressed.
This article belongs to the Special Issue Cloud/Edge/Fog Computing for Network and IoT

Abstract

Fog computing is today considered a promising candidate to improve the user experience in dynamic on-demand computing services. However, its ubiquitous application would require support for this service in wireless multi-hop mesh systems, where the use of conventional IP-based solutions is challenging. As a complementary solution, in this paper, we consider a Named-Data Networking (NDN) approach to enable fog computing services in autonomous dynamic mesh formations. In particular, we jointly implement two critical mechanisms required to extend the NDN-based fog computing architecture to wireless mesh systems. These are (i) dynamic face management systems and (ii) a learning-based route discovery strategy. The former makes it possible to solve NDN issues related to an inability to operate over a broadcast medium. Also, it improves the data-link layer reliability by enabling unicast communications between mesh nodes. The learning-based forwarding strategy, on the other hand, efficiently reduces the amount of overhead needed to find routes in the dynamically changing mesh networks. Our numerical results show that, for static wireless meshes, our proposal makes it possible to fully benefit from the computing resources sporadically available up to several hops away from the consumer. Additionally, we investigate the impacts of various traffic types and NDN caching capabilities, revealing that the latter result in much better system performance while the popularity of the compute service contributes to additional performance gains.

1. Introduction

Fog computing is an emerging data-processing concept poised to significantly influence future networks and Internet of Things (IoT) applications [1,2]. It notably facilitates data processing at end-user devices, as opposed to relying solely on dedicated edge or cloud servers [3]. The recent unprecedented proliferation of wireless connectivity, encompassing direct device-to-device (D2D) communications technologies supported by the IEEE (WiFi-direct [4]), and cellular standards (LTE- and NR-sidelink [5,6,7]) raises the question of how to efficiently extend fog computing architecture to exceptionally dynamic wireless systems, like mobile mesh networks.
Conventionally, fog computing relies on an IP-based architecture, such as in [1,8,9], and requires the domain name resolution system (DNS) for resource discovery. Although several approaches are enabling this functionality in wireless mesh systems [10,11], the performance of these is still far from optimal due to the intermittent nature of wireless links.
Named-Data Networking (NDN) offers new opportunities for enhancing user experiences in scenarios where traditional IP networking is challenged [12,13,14,15]. NDN eliminates the necessity of maintaining communication sessions between explicitly addressable hosts and shifts the focus to the requested content instead [16]. This is achieved by utilizing an ’Interest’ packet to request specific data, irrespective of its location. When a node possesses the requested, it responds to the Interest packet with the data. Notably, the NDN architecture is also inherently agnostic concerning the type of the requested content, rendering it a fitting solution for fog computing applications [17,18].
Fog computing in wireless mesh networks represents an exceptionally dynamic system characterized by its heterogeneous resources. The core factors contributing to this dynamism include node mobility, continuously changing wireless link states, fluctuating availability of computing resources at nodes, and the variability in user requests. Resources, including computing resources, storage, raw sensor data, and functions, are distributed among various proximate end devices. The most efficient way to address such dynamism is to harness all locally available resources and enable multi-tenancy for the resources and computations of the nodes with inherently different capabilities.
The authors of [19] propose a framework encompassing heterogeneous IoT resources in a given region and variations in processing and communication offloading that could be leveraged by the fog IoT architecture. The architecture relies on an IoT-in-the-fog controller that can probe local resources and communicate directly with a local fog mediator, which could be the cloudlet/edge access point. In [20], the authors considered an inter-NDN MANET scenario and overcame session disruptions when crossing MANETs, which ran over different wireless technologies and protocols. The authors of [21] extended the conventional fog-to-cloud communication paradigm by introducing a horizontal fog-to-fog communication layer. This layer utilizes information-centric networking (ICN) to lessen cloud dependency and enhances the fog layer with name-oriented communications, in-network caching, and built-in mobility support to achieve lower latency, better mobility, and higher data communication efficacy for fog computing. Furthermore, to take full advantage of ICN, a fog caching scheme has been enhanced with the in-network caching capability of ICN end-user devices to facilitate content delivery in the IoT environment [22]. The author of [23] developed user-centric and delegated mode-based solutions for service provisioning in NDN systems, where the latter approach presumed outsourcing the service search functionality to the network node. An automated in-network service construction over NDN was provided in [24]. Finally, [25] introduces advancements in service discovery within NDN, enabling exhaustive exploration of network segments.
One of the principal challenges in advancing fog computing over NDN is the current lack of support for multi-hop wireless networks. As of now, a single NDN Forwarding Daemon (NFD) face is employed for communication with all the neighboring devices in wireless setups. This face is bounded by a specific wireless interface (e.g., WiFi board/network interface card (NIC)) configured in broadcast mode. Given that the default NDN technology imposes restrictions on sending a packet via the face from where it was received, wireless communication in NDN is limited to a single hop. This issue also raises problems related to communication reliability in wireless environments, as broadcast wireless communications typically do not support retransmissions. Furthermore, it is important to highlight that the forwarding strategies proposed for NDN have been designed with wired networks in mind, where changes in network topology are infrequent.
The potential applications of Named-Data Networking (NDN) and fog computing span diverse scenarios, each demonstrating the strengths of this technology in dynamic and resource-constrained environments:
  • Mobile network nodes in smart cities: A quintessential example is the smart city infrastructure, where mobile nodes such as vehicles or mobile devices continuously move, dynamically altering the network topology. Leveraging NDN with fog computing in such environments can facilitate efficient data dissemination and retrieval. This combination is particularly beneficial in reducing latency and enhancing data availability at the network’s edge, crucial for real-time applications like traffic management and event streaming.
  • Drones in Mesh Networks: Another promising application involves the use of drones in mesh networks for agricultural monitoring, disaster management, or delivery services. Integrating Fog Computing with NDN here enables drones to share vital information in a robust and decentralized manner. The information could be, for example, weather data or emergency signals. This approach is especially beneficial in areas with limited infrastructure, as it supports autonomous and resilient drone operations.
Further enhancing these scenarios is the application of a multi-stage machine-learning (ML) overlay, which brings capabilities like predictive analytics and adaptive routing. This advancement improves the efficiency and adaptability of the systems, significantly elevating the overall performance and user experience.
This paper addresses the identified gaps and refines existing solutions by proposing two mechanisms that enable efficient NDN-based fog computing services in wireless mesh systems: (i) dynamic face management capability and (ii) adaptive, learning-based forwarding strategy. The first mechanism enhances efficient communications by utilizing unicast transmission mechanisms, such as request-based medium access (RTS/CTS) and acknowledging packets successfully received in WiFi. The second, an adaptive learning-based forwarding strategy, efficiently reduces network interference by forwarding Interest packets towards their intended destinations. Importantly, these two functionalities maintain compatibility with existing NDN stacks, ensuring full backward compatibility with current NDN implementations. Having implemented this system in ndnSIM, an extension module for NS-3 (a network-level simulator, NLS), we subsequently evaluate and characterize the performance of the proposed solution.
The main contributions of our study can be summarized as:
  • joint implementation and evaluation of the unicast Ethernet method faces in NFD, enabling reduced overheads (as compared to broadcast) when forwarding Interest packets in dynamic mesh networks;
  • performance evaluation of the adaptive learning strategy and dynamic Face management system in dynamic network conditions showing that the suggested enhancements in NDN system design efficiently support fog computing in multi-hop wireless mesh systems.
The paper is organized as follows. Section 2 overviews the prior art. Section 3 elaborates on our proposed solutions, including the dynamic Face management system (Section 3.1) and adaptive forwarding strategy (Section 3.2). The performance evaluation of the proposed enhancements is discussed in Section 4. Conclusions are drawn in the last section.

3. The Proposed Solutions

In this section, we propose solutions to enable dynamic computing services over NDN. We start with the face management system, allowing for dynamic creation and removal of faces. The system enables unicast communications between nodes in the mesh wireless network, resulting in improved reliability on the data-link layer. Then, we propose a novel adaptive learning-based forwarding strategy.

3.1. Dynamic Face Management

3.1.1. The Conceptual Approach

The workflow of the proposed solution, depicted in Figure 3, relies on continuous listening of the events on the channel. In particular, (1) when a wireless node comes into the coverage range of another one, the nodes trigger the Face Manager. Next, the Face Manager (2) creates a new Face for communication with the new neighbor node and (3) checks if the physical address (MAC address) of the peering node matches a record in the QDB. If the MAC address (remoteUri) of the peering node matches a record in the QDB, it means that these nodes have communicated recently, and related forwarding information is temporarily stored in the QDB after the communication channel was dropped. In this case, related forwarding information (4) migrates back from the QDB to the FIB while the matched record is (5) removed from the QDB. If (6) a link with one of the neighbor nodes drops, Face Manager deletes the Face associated with the dropped link. However, (7) Face configuration, including its remoteUri has to be stored in QDB for later use. Once done, FIB and PIT entries associated with the Face are also deleted, and the quarantine timer starts for the record created in the QDB. Once the timer expires, the entry is deleted from the QDB.
Figure 3. Workflow of the proposed solution.
This dynamic Face management system enables wireless devices to utilize unicast mode, fully exploiting the benefits of advanced medium access mechanisms (such as RTS/CTS in WiFi) instead of using random access channel variations to transmit user data. Moreover, in unicast mode, wireless technologies support error-control methods, such as automatic repeat requests (ARQ), further improving communication reliability. Eventually, the dynamic Face management system promises a better user experience for customers in wireless mesh networking or other multi-connectivity scenarios. The next section provides an implementation example of the proposed solution for the case of WiFi.

3.1.2. Implementation Details

In Named-Data Networking (NDN), the concept of a Face (implemented as the nfd::Face class) is instrumental in facilitating best-effort delivery services across various underlying communication mechanisms, such as sockets. This abstraction is key in abstracting the complexities and specific details of the underlying protocols, ensuring seamless integration with the forwarding layer of the NDN network [26]. Faces include two main parts—a link service and a transport service (NetDeviceTransport). Faces are created through callbacks by going through each network interface associated with the node (called NetDevices, ND), such as Ethernet port, WiFi board, etc. Configuration of the transport service includes a remoteUri attribute representing the remote endpoint of communication (for example, the MAC address of the neighbor node). This attribute is read-only (immutable during the Face lifetime). The process begins with identifying the scheme corresponding to the underlying protocol, such as Ethernet, in channel-level applications. This is followed by a representation specific to the scheme, which details the underlying address. An example of such an address in the context of Ethernet is 01:00:5e:00:17:aa [26].
In our manuscript, we primarily focus on the application of our modifications within the ndnSIM environment, utilizing NetDevice and WifiNetDevice. However, it is important to note that in a practical, real-world deployment, the NFD interacts with Ethernet adapters through the libpcap library. Although the current scope of our study is centered around simulation, we acknowledge the potential and feasibility of adapting our proposed modifications for real-world implementation, see Figure 4.
Figure 4. Illustration of the proposed modifications.

3.2. Adaptive Forwarding Strategy

The NDN Forwarding Daemon supports modular design and extensibility for NDN protocol. At the data plane, its main functionalities are related to switching packets between its internal components. When the Forwarder receives a packet from an underlying link-layer service, it will consult a forwarding strategy for handling the packet, i.e., inserting, deleting, or updating any needed information in supplementary tables. Thus, by implementing a forwarding strategy, it is possible to control packet flows by making decisions on whether, when, and where to forward the packets.
To evaluate fog computing in dynamic wireless meshes, we considered a self-learning strategy considered in [37]. In our setting, this strategy attempts to find and maintain all (or at least a set of) possible routes by not only forwarding an interest through the already known route but also by probing other faces. This approach is also known as the probing mechanism in the Adaptive Smoothed Face-routing (ASF) strategy. The combined strategy leverages the benefits of the dynamic Face management system. The high-level algorithm behind the proposed combined strategy is illustrated in Figure 5 and consists of the following steps:
Figure 5. Illustration of the proposed window forwarding strategy.
  • Initial broadcast search. The incoming Interest packet is forwarded over all the outgoing interfaces when there is no knowledge available locally about the requested Name. Upon receiving such an Interest packet, a corresponding routing information entry is created.
  • Receiving data reply. Receiving the Data packet over a certain Face implies that the producer is available via that Face. Thus, it can be further utilized for forwarding further Interest packets with the same Name.
  • Unicast search. For a predefined time window, any other similar Names are forwarded directly through the explored direction (Face). During this time, all other Faces are not used. This allows the strategy to minimize broadcasting overhead.
  • Periodic probing. Once in a predefined time window, after a new Interest packet with the already known Name is received, this Interest is sent over all the outgoing Faces that previously did not yield a data reply. This step is needed for both counteracting any possible network topology changes and discovery of other producers.
The algorithm of the considered strategy can be presented in two separate pipelines: Figure 6 shows inbound Interest packet processing and Figure 7 inbound Data packet processing. In both cases, the information about the packet passes from the Forwarder to the Strategy to decide how to proceed with this. See also Table 1.
Figure 6. Inbound Interest handling.
Figure 7. Inbound Data handling.
Table 1. Abbreviations used in the considered self-learning strategy algorithm.
The Interest-handling algorithm is illustrated in Figure 6. Upon receiving an Interest packet, the Self-Learning Strategy utilizes current local knowledge to decide which Faces to use for forwarding. If an Interest packet with a new prefix arrives, the Self-Learning Strategy creates a new entry for all available Faces. For all the previously explored Names, the Self-Learning Strategy holds a decaying time window. If a Face is marked positively, it means that a Data packet with the same Name has been handled before. Thus, this Face has the highest chance of receiving a reply again, and the Self-Learning Strategy forwards a copy of this Interest packet via this Face. At the same time, the strategy checks if the Face was marked positively for a certain period of time (the default value is 10 s, but it can be adjusted depending on the network dynamics) without receiving any Data replies. If this is the case, the strategy marks it as negative and sets a timer FValue.
When a Face is marked negatively, it is no longer used for forwarding purposes, while the values of FValue timer decreases with each time step. When the CurFValue timer reaches zero, and a copy of Interest is forwarded via this Face for probing. If the probing is not successful, i.e., no Data packet is received over this Face, the negative state of this Face is restored.
When the Self-Learning Strategy has to handle a Data packet, it follows the algorithm presented in Figure 7. First, the strategy sends the packet through the available back propagation Face(s) specified in the corresponding PIT entry. Then, it marks the inbound Face positively for the corresponding Name. This Face will then be used in the Interest handling pipeline to forward other Interest packets matching this Name.
An example of the forwarding time window dynamics is shown in Figure 8. For a new Name, all Faces are initialized with a predefined time window value, FValueMaxBase. This puts each Face into the “Exploit” regime, enabling broadcast search over all available Faces. To avoid Faces’ “saturation” when a chosen Face is utilized for a very long period of time, we limit the forwarding time window using FValueMax. The closer the current forwarding value CurFValue to its maximum, specified by FValueMax, the smaller the increment due to the successfully received Data packet. The probing time windows for a Face are represented by orange lines in Figure 8. When probing, the period between attempts increases with every unsuccessful attempt until CurFValue reaches the minimum value, specified by FValueMin.
Figure 8. Example of the forwarding time window dynamics.
With the proposed approach, the Self-Learning Strategy can handle any Interest and Data packets without global knowledge about the network topology, additional internode data exchange, or application configurations. At the same time, the decaying time window utilized by the Self-Learning Strategy can both minimize discovery overhead and handle situations such as link failures or producer re-discovery. The scalability of the proposed solution is ensured by controlling the frequency of flooding. The proposed strategy can also be further optimized to match the requirements of specific scenarios using the following extensions: (i) smart name aggregation into more generic prefixes over time to limit the required memory to store local routing information, (ii) decaying time window size adaptation in real time to account for rapid changes in topology for networking scenarios involving, e.g., nodes mobility, (iii) similarly to [46], “fish-eye” flooding can be implemented to limit the number of hops being flooded upon initial discovery.
We specifically note that the proposed Self-Learning Strategy is conceptually similar to the self-learning strategy in [37]. However, the proposed strategy attempts to find and maintain all (or at least a set of) possible routes by not only forwarding an interest through the already known route but also by probing other faces. The probe is limited by specific exponential timers attached to each face to limit the network flooding—the fewer successful data receptions one obtains through a given face, the less often one will probe it, while successful reception will increase the lifetime of the route.

4. Performance Evaluation

In this section, we analyze the performance of the NDN-based fog computing applications by utilizing network-level simulations (NLS) implemented in the NDN community simulator (ndnSIM) [47]. In particular, we start by describing the simulation environment. Then, we proceed by introducing the considered scenarios and data processing. Finally, we report our numerical results. We note that the baseline results for the system without the proposed enhancements are provided in [23]. We will refer to them throughout this section when discussing the presented results.

4.1. Simulation Setup

To produce our results, we upgraded ndnSIM with the compute service framework introduced in the previous work [23]. On top of that, we implemented in ndnSIM modifications described in Section 3. The main simulation parameters are summarized in Table 2. (There is something wrong with this sentence: Marcin) We specifically node that for static mesh environment, we position nodes on a grid separated by internode distance, L. The considered region is thus a square with an area given by N ( L 1 ) 2 m2, where N is the number of nodes. In a mobile mesh environment, network nodes are initially positioned on a grid and then start to move according to a random direction model (RDM, [48]).
Table 2. Default parameters for simulation campaign.
The simulator was configured as follows:
  • Simulation environment. The considered scenario assumes mobile wireless nodes deployed in an area of limited size (free space environment).
  • Wireless channel. Connectivity between nodes is enabled by IEEE 802.11n (5 GHz) wireless technology, with a range propagation loss model with the cutoff at 100 m and a Minstrel-HT rate adaptation algorithm.
  • Mobility model. At the beginning of the simulation, wireless nodes were organized in a grid with a distance between nodes of 90 m. After the simulation started, wireless nodes started moving following the Random Direction Mobility (RDM) model.
  • Computing application. In this simulation campaign, we assumed that there is a limited number of computing services available in the network. This assumption is motivated by a common IoT operation where devices (e.g., wearables) react to an event (e.g., weather notifications, traffic information) by utilizing standard processing algorithms (different types of software). This assumption justifies the overlapping of services requested by mobile users, supposing that users may request the same processing operations over the same data. More specifically, we considered 100 different software types that can be used to process data. Recognizing the varying popularity levels among software options, we extended our study beyond the uniform choice model, typically referred to as the Constant Bit Rate (CBR) traffic model, to incorporate the Zipf-Mandelbrot law for content popularity assessment. Furthermore, we imposed a constraint on the timeliness of computing results, setting their freshness threshold at one second. This approach implies that any data-processing outcomes are deemed obsolete after one second and are subsequently purged from the cache, provided caching is active. Detailed insights into the computing service methodology utilized in this analysis are elaborated in Pirmagomedov (2020) [23].

4.2. Data Processing and Metrics of Interest

To collect simulation data, we employed the method of replications [49]. For each set of input parameters, we run the simulator for 600 s of the system time one hundred times with different random number seeds. The results obtained in each run have been used to form a sample with independent identically distributed (iid) observations [50] and, thus, the results, presented in further subsections, are considered to be averaged over all the different seeds we have utilized. Given the extensive number of observations, the confidence intervals obtained are very narrow. Therefore, in the presentation of results, only point estimates are depicted.
We consider several metrics of interest, including the fraction of satisfied Interest requests and the mean full delay. In addition, we also report the share of received compute results in time. The latter metric integrates both latency and reliability in a single bundle, providing comprehensive insights into the system behavior.

4.3. Numerical Results

4.3.1. Static Mesh Environment

We start investigating the system performance by reporting the fraction of satisfied Interest requests and mean full delay in Figure 9 for static mesh network conditions as a function of the frequency of Interest per second, 5 × 5 nodes configuration, enabled cache, multiple consumers, and single producer. Please note that from now on, the latter three parameters are encoded as a triple ( C / N , K , M ) , where C / N defines whether cache enabled (C) or not (N), K denotes the number of consumers, M refers to the number of producers.
Figure 9. Loss and delay performance measures in static mesh.
Analyzing the reported results, one may observe that for all the reported Interest frequencies, the mesh is capable of successfully satisfying the compute requests with the fraction reaching 1 for all considered numbers of consumers. The major differences between the considered cases lie in the mean full delay behavior reported in Figure 9b. Here, one may observe that the delay increases with the increased number intensity of Interests as well as with the increased number of consumers. However, even for the most loaded case corresponding to 3 consumers and 30 Interests per second, the mean delay stays well below 50 ms.
Consider now the share of received compute results in time jointly characterizing reliability and full delay in Figure 10 for the same input parameters of the system. As one may observe, in all the considered cases, all the requests are satisfied as the metric of Interest eventually approaches one. The most pronounced effect is caused by increasing the number of consumers from one to three. The rationale is that this increases the overall network load, thus leading to higher latency. Still, even in the most loaded considered case with three consumers and intensities of 30 Interests per second, all the requests are served in just 70 ms.
Figure 10. Share of received compute results in static mesh.

4.3.2. Mobile Mesh Environment

Having analyzed compute performance in static mesh conditions, we next explore the impact of adding mobility to the nodes on mesh dynamics. Figure 11 illustrates the fraction of satisfied Interests as well as mean full delay for different speeds of nodes, 5 × 5 mesh, enabled cache, and one and three producers. Observing the reported data, one may conclude that even slight mobility leads to drastic performance degradation in terms of satisfied fraction of Interest. The change between v = 0 m/s and v = 1 m/s is abrupt, decreasing the amount of satisfied Interest by 90% and 80% for M = 3 and M = 1 , respectively. The major source of performance degradation is related to link breaks between end nodes, leading to the eventual loss of packets. It is important to note that the increase in the number of producers has a positive effect on the system’s performance as more nodes have the requested service available.
Figure 11. Loss and delay performance measures in mobile mesh.
Notably, the mean full delay of delivered packets remains almost intact, with mobility coming into play. The rationale is that in mobile meshes, the considered compute service becomes opportunistic, and the Interests are fulfilled only when there is connectivity between nodes at the moment of request. The trade-off between delay and reliability is further illustrated in Figure 12. Please note that the considered characteristics improve in denser mesh conditions as the probability of the node being disconnected from the network decreases. However, these gains are further reduced by the increased interference level. It is important to note that the caching capability inherent in NDN technology does not significantly enhance compute service performance in dynamic meshes, although it is likely to be influenced by cache parameters such as size and freshness.
Figure 12. Share of received compute results in a mobile mesh.

4.3.3. Effects of Traffic Type and Caching

One of the key benefits of NDN systems is the implementation of caching at intermediate nodes. We now examine how caching and different types of traffic impact compute service performance in a static mesh environment. To this effect, Figure 13 illustrates the share of received compute results in time for 5 × 5 mesh configuration, with cache enabled (C) and disabled (N) as a function of the number of consumers and a single producer. Here, we consider two traffic types, CBR and Zipf. It is important to remember that CBR uniformly selects the compute service from all available services, whereas Zipf traffic reflects content popularity, arranging request probabilities according to service popularity as modeled by the Zipf distribution [51].
Figure 13. Loss and delay performance measures in mobile mesh.
From the data presented in Figure 13, one may confirm that for both considered traffic types, the share of the received compute results reaches 100% irrespective of whether a cache is enabled or not. Analyzing the presented data further, one may conclude that the effect of cache is non-uniform across other service parameters. In particular, for just a single consumer, the effect of caching is insignificant. However, as the number of consumers increases (and thus the intensity of Interests), caching plays a noticeable role. Notably, the gain between K = 3 and K = 1 approaches 0.3 for 50 ms, i.e., 0.6 vs. 0.9 share of the satisfied Interests.
A cross-comparison between Figure 13a and Figure 13b reveals that the caching effect is significantly more evident for the Zipf traffic. The rationale is that this traffic type results in a much wider spread of popular content among the mobile nodes. Remarkably, the difference between enabled and disabled cache is evident already for K = 1 for the Zipf traffic model. Similarly, it is easy to observe the reliability and delay gains of Zipf traffic over the CBR traffic.

4.3.4. Effects of Network Size and Nodes Density

We finalize the exposure of our mechanisms by comparing the performance of the considered dynamic compute service in two extreme cases: large mobile mesh featuring 49 nodes and small static mesh consisting of just 25 ( 5 × 5 ) and 9 ( 3 × 3 ) nodes in Figure 14 for a range of input system parameters. Please note that in both cases, the node’s density is kept constant. As one may observe by analyzing the presented data, the amount of satisfied Interests barely reaches 0.3 for a large mobile mesh within 200 ms. This behavior is regulated by two factors: (i) high interference conditions and (ii) events of nodes’ disconnections from the network. Although there are no measures to combat the latter effect, one may utilize spatial frequency reuse in the underlying wireless technology to improve the performance of the system. In the same interval, is 5 × 5 and 3 × 3 meshes, all the Interests are successfully served.
Figure 14. Loss and delay performance measures in mobile mesh.
As one may observe, the performance of the dynamic compute service heavily depends on the network size. To investigate this effect, deeply revealing and isolating the sources of losses, we complement the previous results by assessing the impact of network density and frequency of requests. To this end, Figure 15 presents satisfied Interest fraction and mean delay for various node velocities in mobile mesh for different initial spacing between nodes specifying the compartment size and thus directly affecting node density. Analyzing the presented results, one may observe that the interplay between node density and velocity is characterized by a complex behavior. In particular, higher velocity leads to worse performance for the lowest considered density. The rationale is that for this density, higher velocity frequently leads to situations where nodes lose entirely network connectivity. Thus, the increase in the network density leads to better performance for higher velocities and worse performance for lower speeds, i.e., for initial internode spacing of 40 m, the satisfied Interest fractions for different velocities even out. This is explained by the second phenomenon affecting system performance—interference. Indeed, by increasing the network density, the amount of interference in the system increases, reducing the satisfied Interest fraction.
Figure 15. Loss and delay metrics for different network densities.
Figure 16 illustrates the satisfied Interest fraction and mean delay for 10 Interest/s frequency, different initial internode spacing, and different nodes’ velocities. By directly comparing the results of Figure 16 and those from Figure 15 illustrating the same metrics for 1 Interest/s, one may observe that the increase in the traffic load logically worsens the system performance for all considered values of nodes velocities and density. The effect of the increased interference impacts the considered deployments differently. In particular, it affects denser deployments with high node velocities, which are much heavier compared to sparser deployments with lower node velocities.
Figure 16. Loss and delay metrics for 10 Interest/s frequency.

4.3.5. Advanced Networking Mechanisms

Please note that the performance of the proposed dynamic compute service may also heavily depend on underlying technology parameters. To this aim, Figure 17 quantifies the satisfied Interest fraction for different WiFi parameters, including disabled and enabled RTS/CTS (denoted by “RTS” and “No RTS”) functionalities, single and multi-channel operational modes (denoted by “S” and “M”) for mobile and static meshes (denoted by “Mob.” and “Stat.”). Recall that previously, we assumed that RTS/CTS functionality was disabled while all nodes operated using the same channel.
Figure 17. Satisfied Interest fraction.
Analyzing the results presented in Figure 17, one may observe that the use of the RTS/CTS scheme does not drastically affect system performance. The only case where it provides a noticeable effect is the case of static environment with single channel operation. The reason for this is that in these conditions, the major source of incorrect packet reception is interference. Enabling RTS/CTS functionality allows improving performance. When nodes are permitted to utilize multiple channels via adaptive channel selection functionality, the interference is negligible, and thus no gains are evident. Addressing the effect of adaptive channel selection, we would like to note that it produces the most effect in static conditions when RTS/CTS is disabled. In mobile conditions, most of the losses are mainly caused by node mobility and, thus, not affected by this functionality.

5. Conclusions

Aiming for the dynamic computing service, in this paper, we extended NDN functionality to the wireless meshes. In particular, we proposed the dynamic face management system enabling unicast transmissions over an inherently broadcast medium and a novel learning-based Self-Learning Strategy that allows a decrease in the number of signaling packets distributed in the network to find paths to the sources. The former allows for unicast transmission, thus reaching the full potential of wireless technologies, e.g., WiFi, while the latter ensures that the amount of overhead for content search is minimized. Both features are specifically useful in dynamic wireless environments such as mesh systems, where the content location and as well as nodes’ connectivity may change as a result of topology changes. Furthermore, to facilitate dynamic compute service, we utilized multiple packet response functionality over NDN from [23]. Our modifications are inherently compatible with the NDN concept and do not alter its core functionality.
We then proceeded to evaluate the effects of dynamic compute service over dynamic meshes. Our findings reveal that for static meshes, our proposal allows us to fully benefit from the computing resources available sporadically around the consumer. However, similar to IP-based networks, mobility is still the most dominating source of performance degradation. In a mobile mesh environment, the performance is determined by the interplay between node velocity, deployment density, and traffic intensity, i.e., higher velocity improves performance in denser scenarios and deteriorates in sparser deployments. The inherent caching capability of NDN technology does not help to improve the performance of mobile systems. Denser conditions do not allow for improving the system’s performance as the level of interference increases. Finally, we characterized the effects of different types of traffic and NDN caching capabilities by showing that the latter results in much better system performance while the popularity of the compute service adds additional performance gains. The underlying wireless technology functionality, such as RTS/CTS, may also affect service performance in specific conditions.
In addition, a particularly promising direction for expanding our work is the incorporation of smart name aggregation into more generic prefixes over time. This strategy can effectively limit the required memory for storing local routing information. By adopting such an approach, our system could achieve greater efficiency and scalability, especially in scenarios where resources are constrained. This enhancement not only optimizes our current framework but also broadens the applicability of our system in various wireless mesh network environments [52]. Finally, we would like to mention that the proposed and the current Face implementations introduce different types of overheads in dynamic network conditions. The comparison of these overheads, as well as full performance evaluation and comparison between current and suggested implementations, are a part of our future work.

Author Contributions

Conceptualization, A.S., D.M., H.F., M.S, Y.Z. and S.S.; methodology, A.S., R.G., G.A., H.F., Y.Z. and D.M.; software, A.S. and R.G.; validation, S.S. and D.M.; formal analysis, D.M.; investigation, A.S., R.G. and D.M.; resources, S.S.; data curation, A.S.; writing—original draft preparation, R.G., D.M. and A.S.; writing—review and editing, R.G., D.M., S.S., A.S., Y.Z. and M.S.; visualization, A.S.; supervision, S.S., N.H. and Y.K.; project administration, N.H. and Y.K.; funding acquisition, S.S. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by Intel Labs, USA.

Institutional Review Board Statement

Not applicable.

Data Availability Statement

Data are contained within the article.

Conflicts of Interest

Authors Srikathyayani Srikanteswara, Gabriel Arrobo, Yi Zhang, Hao Feng, Nageen Himayat and Marcin Spoczynski were employed by the company Intel Labs. The remaining authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.

References

  1. Hu, P.; Dhelim, S.; Ning, H.; Qiu, T. Survey on fog computing: Architecture, key technologies, applications and open issues. J. Netw. Comput. Appl. 2017, 98, 27–42. [Google Scholar] [CrossRef]
  2. Chiang, M.; Ha, S.; Risso, F.; Zhang, T.; Chih-Lin, I. Clarifying fog computing and networking: 10 questions and answers. IEEE Commun. Mag. 2017, 55, 18–20. [Google Scholar] [CrossRef]
  3. Aazam, M.; Zeadally, S.; Harras, K.A. Fog computing architecture, evaluation, and future research directions. IEEE Commun. Mag. 2018, 56, 46–52. [Google Scholar] [CrossRef]
  4. Khan, M.A.; Cherif, W.; Filali, F.; Hamila, R. Wi-Fi Direct Research-Current Status and Future Perspectives. J. Netw. Comput. Appl. 2017, 93, 245–258. [Google Scholar] [CrossRef]
  5. Molina-Masegosa, R.; Gozalvez, J. LTE-V for sidelink 5G V2X vehicular communications: A new 5G technology for short-range vehicle-to-everything communications. IEEE Veh. Technol. Mag. 2017, 12, 30–39. [Google Scholar] [CrossRef]
  6. Asadi, A.; Wang, Q.; Mancuso, V. A survey on device-to-device communication in cellular networks. IEEE Commun. Surv. Tutor. 2014, 16, 1801–1819. [Google Scholar] [CrossRef]
  7. Campolo, C.; Molinaro, A.; Romeo, F.; Bazzi, A.; Berthet, A.O. 5g nr v2x: On the impact of a flexible numerology on the autonomous sidelink mode. In Proceedings of the 2019 IEEE 2nd 5G World Forum (5GWF), Dresden, Germany, 30 September–2 October 2019; pp. 102–107. [Google Scholar]
  8. Wu, J.; Dong, M.; Ota, K.; Li, J.; Yang, W.; Wang, M. Fog-computing-enabled cognitive network function virtualization for an information-centric future Internet. IEEE Commun. Mag. 2019, 57, 48–54. [Google Scholar] [CrossRef]
  9. Wu, J.; Dong, M.; Ota, K.; Li, J.; Guan, Z. FCSS: Fog computing based content-aware filtering for security services in information centric social networks. IEEE Trans. Emerg. Top. Comput. 2017, 7, 553–564. [Google Scholar] [CrossRef]
  10. Gierłowski, K. Cross-layer mDNS/ARP integration for IEEE 802.11 s Wireless mesh Network. In Proceedings of the 2016 9th IFIP Wireless and Mobile Networking Conference (WMNC), Colmar, France, 11–13 July 2016; pp. 33–40. [Google Scholar]
  11. Ndlovu, L.; Kogeda, O.P.; Lall, M. Enhanced service discovery model for wireless mesh networks. J. Adv. Comput. Intell. Intell. Inform. 2018, 22, 44–53. [Google Scholar] [CrossRef]
  12. Afanasyev, A.; Burke, J.; Refaei, T.; Wang, L.; Zhang, B.; Zhang, L. A brief introduction to Named Data Networking. In Proceedings of the MILCOM 2018—2018 IEEE Military Communications Conference (MILCOM), Los Angeles, CA, USA, 29–31 October 2018; pp. 1–6. [Google Scholar]
  13. Mastorakis, S.; Mtibaa, A. Towards service discovery and invocation in data-centric edge networks. In Proceedings of the 2019 IEEE 27th International Conference on Network Protocols (ICNP), Chicago, IL, USA, 8–10 October 2019; pp. 1–6. [Google Scholar]
  14. Tariq, A.; Rehman, R.A.; Kim, B.S. EPFAn Efficient Forwarding Mechanism in SDN Controller Enabled Named Data IoTs. Appl. Sci. 2020, 10, 7675. [Google Scholar] [CrossRef]
  15. Ullah, R.; Rehman, M.A.U.; Naeem, M.A.; Kim, B.S.; Mastorakis, S. ICN with edge for 5G: Exploiting in-network caching in ICN-based edge computing for 5G networks. Future Gener. Comput. Syst. 2020, 111, 159–174. [Google Scholar] [CrossRef]
  16. Khelifi, H.; Luo, S.; Nour, B.; Moungla, H.; Faheem, Y.; Hussain, R.; Ksentini, A. Named data networking in vehicular ad hoc networks: State-of-the-art and challenges. IEEE Commun. Surv. Tutor. 2019, 22, 320–351. [Google Scholar] [CrossRef]
  17. Moll, P.; Posch, D.; Hellwagner, H. Investigation of push-based traffic for conversational services in named data networking. In Proceedings of the 2017 IEEE International Conference on Multimedia & Expo Workshops (ICMEW), Hong Kong, China, 10–14 July 2017; pp. 315–320. [Google Scholar]
  18. Saltarin, J.; Bourtsoulatze, E.; Thomos, N.; Braun, T. Adaptive video streaming with network coding enabled named data networking. IEEE Trans. Multimed. 2017, 19, 2182–2196. [Google Scholar] [CrossRef]
  19. Oteafy, S.M.; Hassanein, H.S. IoT in the fog: A roadmap for data-centric IoT development. IEEE Commun. Mag. 2018, 56, 157–163. [Google Scholar] [CrossRef]
  20. Lee, E.K.; Lim, J.H.; Gerla, M. Polycast: A new paradigm for information-centric data delivery in heterogeneous mobile fog networks. Int. J. Distrib. Sens. Netw. 2017, 13, 1550147717731529. [Google Scholar] [CrossRef]
  21. Nguyen, D.; Shen, Z.; Jin, J.; Tagami, A. ICN-Fog: An information-centric fog-to-fog architecture for data communications. In Proceedings of the GLOBECOM 2017-2017 IEEE Global Communications Conference, Singapore, 4–8 December 2017; pp. 1–6. [Google Scholar]
  22. Hua, Y.; Guan, L.; Kyriakopoulos, K. A Fog caching scheme enabled by ICN for IoT environments. Future Gener. Comput. Syst. 2020, 111, 82–95. [Google Scholar] [CrossRef]
  23. Pirmagomedov, R.; Srikanteswara, S.; Moltchanov, D.; Arrobo, G.; Zhang, Y.; Himayat, N.; Koucheryavy, Y. Augmented Computing at the Edge Using Named Data Networking. In Proceedings of the Accepted to 2020 IEEE Globecom Workshops (GC Wkshps), Taipei, Taiwan, 7–11 December 2020; pp. 1–6. [Google Scholar]
  24. Kovalchukov, R.; Glazkov, R.; Srikanteswara, S.; Zhang, Y.; Moltchanov, D.; Arrobo, G.; Feng, H.; Spoczynski, M.; Himayat, N. In-Network Dynamic Compute Orchestration Over Mobile Edge Systems. In Proceedings of the 2023 IEEE 97th Vehicular Technology Conference (VTC2023-Spring), Florence, Italy, 20–23 June 2023; pp. 1–7. [Google Scholar] [CrossRef]
  25. Zhang, Y.; Srikanteswara, S.; Feng, H.; Arrobo, G.; Spoczynski, M.; Himayat, N.; Moltchanov, D.; Glazkov, R. Dynamic Pervasive Compute Orchestration using Information Centric Network. In Proceedings of the 2023 IEEE Wireless Communications and Networking Conference (WCNC), Glasgow, UK, 26–29 March 2023; pp. 1–6. [Google Scholar] [CrossRef]
  26. Afanasyev, A.; Shi, J.; Zhang, B.; Zhang, L.; Moiseenko, I.; Yu, Y.; Shang, W.; Huang, Y.; Abraham, J.P.; DiBenedetto, S.; et al. NFD Developer’s Guide; Tech. Rep. NDN-0021; Department of Computer Science, University of California: Los Angeles, CA, USA, 2018. [Google Scholar]
  27. NFD: Named Data Networking Forwarding Daemon Documentation UnicastEthernetTransport Class Reference. Available online: https://docs.named-data.net/NFD/0.6.0/doxygen/d5/dbe/classnfd_1_1face_1_1_unicast_ethernet_transport.html (accessed on 20 December 2023).
  28. Oh, S.Y.; Lau, D.; Gerla, M. Content centric networking in tactical and emergency manets. In Proceedings of the 2010 IFIP Wireless Days, Venice, Italy, 20–22 October 2010; pp. 1–5. [Google Scholar]
  29. Akyildiz, I.F.; Wang, X.; Wang, W. Wireless mesh networks: A survey. Comput. Netw. 2005, 47, 445–487. [Google Scholar] [CrossRef]
  30. Mascarenhas, D.M.; Moraes, I.M. Limiting the interest-packet forwarding in information-centric wireless mesh networks. In Proceedings of the 2014 IFIP Wireless Days (WD), Rio de Janeiro, Brazil, 12–14 November 2014; pp. 1–6. [Google Scholar]
  31. Wang, L.; Afanasyev, A.; Kuntz, R.; Vuyyuru, R.; Wakikawa, R.; Zhang, L. Rapid traffic information dissemination using named data. In Proceedings of the 1st ACM Workshop on Emerging Name-Oriented Mobile Networking Design-Architecture, Algorithms, and Applications, Hilton Head, SC, USA, 11 June 2012; pp. 7–12. [Google Scholar]
  32. Kalafatidis, S.; Demiroglou, V.; Mamatas, L.; Tsaoussidis, V. Experimenting with an SDN-Based NDN Deployment over Wireless Mesh Networks. In Proceedings of the IEEE INFOCOM 2022—IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), New York, NY, USA, 2–5 May 2022; pp. 1–6. [Google Scholar] [CrossRef]
  33. Putri, A.S.; Sofiyati, M.; Mahesa, A.B.Y.D.; Nurkahfi, G.N.; Syambas, N.R. Forwarding Strategies Effect on Named Data Network Traffic Load. Case Study: Simulation with Mini NDN. In Proceedings of the 2021 15th International Conference on Telecommunication Systems, Services, and Applications (TSSA), Bali, Indonesia, 18–19 November 2021; pp. 1–5. [Google Scholar] [CrossRef]
  34. Amadeo, M.; Molinaro, A.; Ruggeri, G. E-CHANET: Routing, forwarding and transport in Information-Centric multihop wireless networks. Comput. Commun. 2013, 36, 792–803. [Google Scholar] [CrossRef]
  35. Chowdhury, M.; Khan, J.A.; Wang, L. Smart Forwarding in NDN VANET. In Proceedings of the 6th ACM Conference on Information-Centric Networking, Macau, China, 24–26 September 2019; pp. 153–154. [Google Scholar]
  36. Shi, J.; Newberry, E.; Zhang, B. On broadcast-based self-learning in named data networking. In Proceedings of the 2017 IFIP Networking Conference (IFIP Networking) and Workshops, Stockholm, Sweden, 12–16 June 2017; pp. 1–9. [Google Scholar] [CrossRef]
  37. Liang, T.; Pan, J.; Rahman, M.A.; Shi, J.; Pesavento, D.; Afanasyev, A.; Zhang, B. Enabling Named Data Networking Forwarder to Work Out-of-the-Box at Edge Networks. In Proceedings of the 2020 IEEE International Conference on Communications Workshops (ICC Workshops), Dublin, Ireland, 7–11 June 2020; pp. 1–6. [Google Scholar] [CrossRef]
  38. Al-Arnaout, Z.; Fu, Q.; Frean, M. A content replication scheme for wireless mesh networks. In Proceedings of the 22nd International Workshop on Network and Operating System Support for Digital Audio and Video, Toronto, ON, Canada, 7–8 June 2012; pp. 39–44. [Google Scholar]
  39. Burresi, S.; Canali, C.; Renda, M.E.; Santi, P. Meshchord: A location-aware, cross-layer specialization of chord for wireless mesh networks (concise contribution). In Proceedings of the 2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom), Hong Kong, China, 17–21 March 2008; pp. 206–212. [Google Scholar]
  40. Baugh, J.; Guo, J. Enhancing Cache Robustness in Information-Centric Networks: Per-Face Popularity Approaches. Network 2023, 3, 502–521. [Google Scholar] [CrossRef]
  41. Liu, Z.; Jin, X.; Li, Y.; Zhang, L. NDN-Based Coded Caching Strategy for Satellite Networks. Electronics 2023, 12, 3756. [Google Scholar] [CrossRef]
  42. Anastasiades, C. Information-Centric Communication in Mobile and Wireless Networks. Ph.D. Thesis, Universität Bern, Bern, Switzerland, 2016. [Google Scholar]
  43. Anastasiades, C.; Weber, J.; Braun, T. Dynamic unicast: Information-centric multi-hop routing for mobile ad-hoc networks. Comput. Netw. 2016, 107, 208–219. [Google Scholar] [CrossRef]
  44. Wang, L.; Lehman, V.; Hoque, A.K.M.M.; Zhang, B.; Yu, Y.; Zhang, L. A Secure Link State Routing Protocol for NDN. IEEE Access 2018, 6, 10470–10482. [Google Scholar] [CrossRef]
  45. Tariq, A.; Rehman, R.A.; Kim, B.S. Energy Efficient Priority Aware Forwarding in SDN Enabled Named Data Internet of Things. In Proceedings of the 2020 International Conference on Electronics, Information, and Communication (ICEIC), Barcelona, Spain, 19–22 January 2020; pp. 1–4. [Google Scholar]
  46. Pei, G.; Gerla, M.; Chen, T.W. Fisheye state routing: A routing scheme for ad hoc wireless networks. In Proceedings of the 2000 IEEE International Conference on Communications, ICC 2000, New Orleans, LA, USA, 18–22 June 2000; Volume 1, pp. 70–74. [Google Scholar]
  47. ndnSIM Documentation. Available online: https://ndnsim.net/current/ (accessed on 6 November 2023).
  48. Nain, P.; Towsley, D.; Liu, B.; Liu, Z. Properties of random direction models. In Proceedings of the IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies, Miami, FL, USA, 13–17 March 2005; Volume 3, pp. 1897–1907. [Google Scholar]
  49. Hoad, K.; Robinson, S.; Davies, R. Automated selection of the number of replications for a discrete-event simulation. J. Oper. Res. Soc. 2010, 61, 1632–1644. [Google Scholar] [CrossRef]
  50. Perros, H. Computer simulation techniques. In The Definitive Introduction; North Carolina State University: Raleigh, NC, USA, 2009. [Google Scholar]
  51. Mastorakis, S.; Afanasyev, A.; Zhang, L. On the evolution of ndnSIM: An open-source simulator for NDN experimentation. ACM SIGCOMM Comput. Commun. Rev. 2017, 47, 19–33. [Google Scholar] [CrossRef]
  52. Liang, T.; Shi, J.; Wang, Y.; Zhang, B. On the Prefix Granularity Problem in NDN Adaptive Forwarding. IEEE/ACM Trans. Netw. 2021, 29, 2820–2833. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Article Metrics

Citations

Article Access Statistics

Multiple requests from the same IP address are counted as one view.