Downstream Upstream Interest CS PIT FIB Miss Hit Data Aggregate Interest Miss Hit NACK Hit Miss Forward CS PIT Data Hit Cache Miss Drop Data Forward NDN Router NDN Router Forwarding Strategy

BitTorrent is a popular application for peer-to-peer file sharing in today’s Internet. In the core of BitTorrent is a data-centric data dissemination approach, where peers request pieces of the file(s) from each other, and each retrieved piece can be verified using cryptographic hashes. This process looks similar to that of the Named Data Networking (NDN) architecture, but is realized completely at the application level on top of the channel-based TCP/IP networking. Consequently BitTorrent has to maintain an overlay network of peers, discover and share IP addresses of peers, keep track the quality of established connections, and incentivize other peers to share data. This paper presents the design of nTorrent, a BitTorrent-like application that is based on the natively data-centric NDN network architecture. Through analysis and simulation-based experimentations, the paper exposes impacts of the network-level data-centricity on the design choices, implementation complexity, and protocol operations.

[1]  David D. Clark,et al.  Architectural considerations for a new generation of protocols , 1990, SIGCOMM '90.

[2]  B. Cohen,et al.  Incentives Build Robustness in Bit-Torrent , 2003 .

[3]  William Chan,et al.  Improving Traffic Locality in BitTorrent via Biased Neighbor Selection , 2006, 26th IEEE International Conference on Distributed Computing Systems (ICDCS'06).

[4]  Fabián E. Bustamante,et al.  Taming the torrent: a practical approach to reducing cross-isp traffic in peer-to-peer systems , 2008, SIGCOMM '08.

[5]  Sasu Tarkoma Overlay Networks - Toward Information Networking , 2010 .

[6]  Keith W. Ross,et al.  Understanding Peer Exchange in BitTorrent Systems , 2010, 2010 IEEE Tenth International Conference on Peer-to-Peer Computing (P2P).

[7]  Walid Dabbous,et al.  Pushing BitTorrent locality to the limit , 2008, Comput. Networks.

[8]  Bengt Ahlgren,et al.  A survey of information-centric networking , 2012, IEEE Communications Magazine.

[9]  HyunYong Lee,et al.  Efficient User-Assisted Content Distribution over Information-Centric Network , 2012, Networking.

[10]  Ashok Narayanan,et al.  Self-verifying names for read-only named data , 2012, 2012 Proceedings IEEE INFOCOM Workshops.

[11]  Alexander Afanasyev,et al.  journal homepage: www.elsevier.com/locate/comcom , 2022 .

[12]  HyunYong Lee,et al.  User-assisted in-network caching in information-centric networking , 2013, Comput. Networks.

[13]  Syed Obaid Amin,et al.  NLSR: named-data link state routing protocol , 2013, ICN '13.

[14]  Hossam S. Hassanein,et al.  A value-based cache replacement approach for Information-Centric Networks , 2013, 38th Annual IEEE Conference on Local Computer Networks - Workshops.

[15]  Los Angeles,et al.  Addressing Operational Challenges in Named Data Networking Through NDNS Distributed Database , 2013 .

[16]  Lixia Zhang,et al.  FileSync / NDN : Peer-to-Peer File Sync over Named Data Networking , 2013 .

[17]  Nicola Blefari-Melazzi,et al.  Peer-to-peer live adaptive video streaming for Information Centric cellular networks , 2013, 2013 IEEE 24th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC).

[18]  Davide Pesavento,et al.  NFD Developer's Guide , 2014 .

[19]  Patrick Crowley,et al.  Named data networking , 2014, CCRV.

[20]  Alexander Afanasyev,et al.  SNAMP: Secure namespace mapping to scale NDN forwarding , 2015, 2015 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).

[21]  Younghoon Kim,et al.  Scalable and efficient file sharing in information-centric networking , 2015, J. Netw. Comput. Appl..

[22]  Lixia Zhang,et al.  ndnSIM 2 : An updated NDN simulator for NS-3 , 2016 .

[23]  Christopher A. Wood,et al.  File-Like ICN Collection (FLIC) , 2017 .