Next Article in Journal
HiVTac: A High-Speed Vision-Based Tactile Sensor for Precise and Real-Time Force Reconstruction with Fewer Markers
Previous Article in Journal
Investigation of the Possibility of Using Microspectrometers Based on CMOS Photodiode Arrays in Small-Sized Devices for Optical Diagnostics
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Context-Aware Pending Interest Table Management Scheme for NDN-Based VANETs

1
Department of Computer Science, COMSATS University, Islamabad 45550, Pakistan
2
Department of Computing and Mathematics, Manchester Metropolitan University, Manchester M15 6BH, UK
3
Department of Information Technology, College of Computer and Information Sciences, King Saud University, Riyadh 11543, Saudi Arabia
4
Department of Computer Engineering, College of Computer and Information Sciences, King Saud University, Riyadh 11543, Saudi Arabia
*
Authors to whom correspondence should be addressed.
Sensors 2022, 22(11), 4189; https://doi.org/10.3390/s22114189
Submission received: 5 April 2022 / Revised: 11 May 2022 / Accepted: 25 May 2022 / Published: 31 May 2022
(This article belongs to the Topic Intelligent Transportation Systems)

Abstract

:
In terms of delivery effectiveness, Vehicular Adhoc NETworks (VANETs) applications have multiple, possibly conflicting, and disparate needs (e.g., latency, reliability, and delivery priorities). Named Data Networking (NDN) has attracted the attention of the research community for effective content retrieval and dissemination in mobile environments such as VANETs. A vehicle in a VANET application is heavily reliant on information about the content, network, and application, which can be obtained from a variety of sources. The information gathered can be used as context to make better decisions. While it is difficult to obtain the necessary context information at the IP network layer, the emergence of NDN is changing the tide. The Pending Information Table (PIT) is an important player in NDN data retrieval. PIT size is the bottleneck due to the limited opportunities provided by current memory technologies. PIT overflow results in service disruptions as new Interest messages cannot be added to PIT. Adaptive, context-aware PIT entry management solutions must be introduced to NDN-based VANETs for effective content dissemination. In this context, our main contribution is a decentralised, context-aware PIT entry management (CPITEM) protocol. The simulation results show that the proposed CPITEM protocol achieves lower Interest Satisfaction Delay and effective PIT utilization based on context when compared to existing PIT entry replacement protocols.

1. Introduction

Rapid advancements in various network technologies, such as Wireless Local Area Networks (WLANs) and cellular systems promise to accelerate the advancement of Intelligent Transportation Systems (ITS) [1]. Many cities around the world are experiencing population growth and rapid urbanization, as well as an increase in vehicle traffic relative to road infrastructure. The number of deaths caused by traffic accidents is by far the highest of any category of accidental deaths every year. ITS introduced Vehicular Ad hoc NETwork (VANET) to create a safer architecture for road transportation in order to make the journey safer, less stressful, and more enjoyable [2]. In VANETs, each vehicle relies on the processing, storage, and communication capabilities of On-Board Units (OBUs), which manufacturers are already incorporating into vehicles. As VANET is a critical component of ITS, research academies and industrialists are paying close attention. The VANETs communication capabilities enable vehicles to communicate with one another and with infrastructure (such as a Road-Side Unit (RSU)). The capability of in-vehicle technology enables a wide range of applications in which vehicles interact and collaborate with one another and with infrastructure. VANET was created primarily to support safety-related applications. Recently, autonomous and coordinated driving applications have emerged as yet another compelling reason to adopt VANETs [3]. In addition, infotainment applications continue to entice drivers who want to exchange multimedia content while driving.
In traditional Internet Protocol (IP)-based VANETs, each vehicle must be identified with a unique address, similar to Mobile Ad hoc Networks (MANETs) [3]. The IP communication model is based on host-to-host communications, in which one host requests a resource and others provide it. VANET is an information-centric network, where in most applications the vehicles care about information. Named Data Networking (NDN), which is one of the realizations of ICN, decouples content from producers and retrieves content from the nearest content holder using hierarchically and semantically meaningful names [4,5]. The closest content holder could be the original content producer or a node with a valid copy of the requested content. By increasing the number of content sources, NDN reduces content delivery delay and thus increases content delivery probability.
The NDN architecture is a promising replacement for the TCP/IP architecture [4,5]. As mentioned before, NDN is a content-centric protocol that focuses on the desired data, not the location of the data. NDN architecture supports mobility. Consumer (content requester) mobility is by default supported in the original design of NDN. NDN allows for assigning unique names to contents that can be used for its search, retrieval, storage, etc. Moreover, NDN supports ubiquitous in-network distributed caching, which allows intermediate routers (vehicles) to cache content to reduce the delay in obtaining content. NDN supports two types of messages: (i) Interest messages and (ii) Data messages. Customers request content by sending out an Interest message. The content holder who has the requested content forwards the Data message after receiving the Interest message. Each node in the native NDN contains three data structures. The Forwarding Information Base (FIB) data structure stores forwarding information by keeping a mapping of content name prefixes and interfaces (Faces) through which Data messages can be forwarded. The Pending Interest Table (PIT) keeps track of all pending Interests and their incoming interfaces that have yet to be served. The content objects are cached by the Content Store (CS) based on a caching policy. In NDN-based VANETs, content is requested by name. Additional information about the requested content may be included in the name.
Various VANET applications have multiple, possibly conflicting, and disparate QoS expectations [5,6,7,8,9]. For example, safety applications have low latency requirements, whereas non-safety applications do not have low latency requirements. Inefficient safety-related content dissemination could result in fatalities and disabilities. In the event of a road hazard, information must be received at the nearest traffic police station as soon as possible. Otherwise, it may cause traffic congestion, resulting in injuries, property damage, and lost time for motorists and passengers. In VANET applications, a vehicle is highly dependent on information about the content, network, and application, which can be obtained from a variety of sources [8,9]. The information gathered can be used as context to make better decisions [8,9]. In the case of VANETs, the context may include node position, speed, time when the content is generated, location where the content is generated, content type (safety, non-safety), application to which the content belongs, content format, application popularity, neighbourhood conditions, and many others. Recently, NDN has gained increasing attention for content distribution in VANETs [4,5,6]. Taking into consideration the VANET characteristics, wireless environment, and applications, efficient and effective content dissemination in NDN-based VANETs is a well-known problem and faces unique challenges [5,6] including content naming, forwarding, and PIT management. Context information can be used to not only improve the performance of routing (forwarding) protocols, but can also be exploited in making dynamic decisions such as those related to selecting the appropriate forwarding protocol and making NDN’s pending interest table (PIT) management decisions. Context information (embedded in Interest messages, content names, and collected by vehicles) can be used to enable efficient and effective content distribution in NDN-based VANETs [5,8,9]. While it is difficult to obtain the necessary context information at the IP network layer, the emergence of NDN is changing the tide.
The Pending Information Table (PIT) is a key player in finding content in NDN. Due to the limited opportunities offered by current memory technologies, PIT size is a bottleneck. The stored PIT Entry (PITE) is removed either when the PIT Entry Lifetime (PEL) expires or the vehicle with P I T E receives the required Data packet. Flooding of Interest packets in NDN-based VANETs can quickly increase PIT size. In VANETs, Interest flooding and a large PEL can exhaust the PIT, impacting the overall Interest Satisfaction Rate (ISR). PIT overflow result in service disruptions as new Interest messages PIT entries cannot be added to PIT. In case of overload, to make space for the future PIT entries, the current state-of-the-art method removes entries with low priority. Priority is computed based on the PEL and number of requests received for the content [10]. The existing state-of-the-art methods do not consider context such as application type or content type while computing the priority. Different delivery priorities may be necessitated for traffic of the same type. For example, the delivery of a video required for safe driving (to raise awareness about the area in bad weather) should take priority over the delivery of a cartoon film video to a child. The later video type is less critical.
In this work, therefore, we focus on PIT management. More specifically, the major contributions of this paper can be summarized as follows:
  • In this work, we focus on the context-aware adaptive PIT management scheme named Context-aware PIT Entry Management (CPITEM). The CPITEM scheme supports efficient use of PIT, taking into the consideration that VANET applications may have different QoS needs. CPITEM exploits the context information collected by the vehicle and presents it in the Context-aware Content Name (CACN) [9]. CACN is one of the important information components of the Interest and Data packet header.
  • A simulation-based experimental study is conducted in an NS-3-based NDN simulator (ndnSIM) [11] to check the performance of the proposed scheme with relevant and state-of-the-art scheme [10].
The remainder of the paper is organized as follows. Section 2 describes the applications of VANETs; Section 3 presents the background related to PIT management in NDN-based VANETs. Section 4 presents the context-aware PIT management mechanism for NDN-based VANETs; Section 5 presents the performance analysis; and finally, Section 6 concludes our work.

2. VANETs Applications

Typical VANETs applications can be broadly classified into two categories: (i) safety, (ii) non-safety applications.

2.1. Safety Applications

Applications under the safety subgroup include time-sensitive applications. If the relevant information is not delivered in time, its usefulness is lost. The quality of service demanded by safety applications is close to real-time. Inefficient safety-related content dissemination could lead to life loss and disabilities. Road safety applications primarily assist drivers in avoiding vehicle collisions and lowering crash fatality ratios [5,6,8,9]. The majority of applications in this category are location- and time-based. These applications have a more localised spatial scope in terms of the extent of a geographical area in which the information is required and considered valuable (referred to as spatial validity of the content) [5,6,9]. Some of the safety applications are as follows:
  • Post-crash notification: The spatial validity of this application is 500 m, and the temporal validity is 30 s [5,6,9].
  • Emergency vehicle warning: The spatial validity of this application is 500 m, and the temporal validity is 10 m [5,6,9].
  • Dangerous road warning: The spatial validity of this application is 100 m, and the temporal validity is 10 s [5,6,9].

2.2. Non-Safety Applications

Comfort and entertainment applications are called non-safety applications that aim to improve the comfort levels of drivers and passengers and make travel more pleasant. [5,6,9]. Communication usually takes place between vehicles or between vehicles and an RSU. Non-safety applications can tolerate delays because they do not have strict real-time requirements. Vehicles can use spatial- and time-validity information to determine PEL, where to cache and whether to participate in message dissemination.
Some of the non-safety applications are as follows:
  • Traffic navigation map: The spatial validity of the traffic navigation map is 10 km, and the time validity is 30 min [5,6,9].
  • Entertainment/Multimedia applications: Music downloads, file sharing, home control, and other interactive entertainment applications are examples of interactive entertainment applications. Information is not required by all vehicles, but rather on-demand based on user preferences.
  • Commercial advertisement: The spatial validity of this application is 1.5 km, and the temporal validity is 1–10 days [5,6,9].

3. PIT Management in NDN-Based VANETs

The PIT data structure contains information about Interests currently pending, its outgoing interfaces from where the data are yet to be received and the incoming interface that has not yet been served. In other words, PIT is held accountable to store the content name and other important information components of the Interest, for which no Data message has been received yet. It also contains information about recently satisfied Interests. PIT Entry (PITE) is a set of InRecords and a collection of O u t R e c o r d s . I n R e c o r d and O u t R e c o r d comprised a set of attributes such as Nonce, reference to the face, and the timestamp at which the Interest arrives [12]. P I T E is identified by the Interest name. Interest is uniquely identified by combining two fields: name and Nonce. Nonce is a random number generated by the consumer vehicle and inserted in the Interest header. The I n t e r e s t L i f e t i m e field in the Interest packet controls the expiration of the Inrecord. If I n t e r e s t L i f e t i m e is not specified, the value 4 s is used as the default. If an Interest is not satisfied within the I n t e r e s t L i f e t i m e period, the relevant P I T E is deleted [12,13]. When I n t e r e s t L i f e t i m e elapses after the last Interest packet arrives, an in-record expires. When all the InRecords expire, the P I T E expires. If a P I T E contains at least one unexpired InRecord, it is said to be pending. When I n t e r e s t L i f e t i m e elapses after the last Interest packet is sent, an OutRecord expires.
P I T E is associated with an expiry timer. The e x p i r y timer is fired when the P I T E expires. When P I T E lifetime is short, it becomes difficult to detect the Interest loop problem, caused by congestion or multi-path propagation. Therefore, another data structure called D e a d N o n c e L i s t is considered for loop detection that complements PIT. The entry deleted from PIT is stored in the DeadNoncelist for some time to address the loopback problem. The entry in the D e a d N o n c e L i s t comprises Interest name and Nonce. Each entry in the D e a d N o n c e L i s t is associated with the static 6 s time value. When an Interest is received, its Nonce and the name is checked in the D e a d N o n c e L i s t . If the matching entry is found, the loop is suspected and the Interest is considered invalid. If a matching Nonce is not found in the D e a d N o n c e L i s t , it searches PIT for the existing entry. If the P I T E already exists, the incoming Interest Nonce is checked in the existing P I T E before it is processed further. Initially, for each new PITE, the PEL is set by considering the InterestLifeTime field in the Interest. I n t e r e s t L i f e t i m e is specified in the Interest packet header by the consumer before forwarding the packet. The P I T E is removed when the PEL expires or the vehicle with P I T E receives the required Data packet. In Vanilla NDN, the PEL default value is 4 s.
When a new interest is received and its name matches the PITE, then its Nonce is compared to the Nonces in P I T E InRecords. If the Nonce in the new Interest matches the Nonce in an InRecord with similar face, the Interest is considered a legitimate retransmission because there is no risk of a persistent loop. The Interest message is considered as a duplicate in case the Nonce matches the Nonce in an in-record of a different face. If a similar Nonce is not found, the Interest is considered as a new valid Interest. When a new valid Interest for the same name arrives, the expiry timer on the existing P I T E is extended. Upon receiving Interest, if no matching P I T E is found, then the cache (content store) is checked for the required content. If the required content is not in its cache, an I n R e c o r d is added with the incoming face to the PIT. Afterwards, the Interest message is forwarded and O u t R e c o r d (which represents the upstream face for the Interest) is added to the PITE. Otherwise, if the required content is found in the cache, the Data message is forwarded with the relevant content to the interfaces saved in InRecord and finally P I T E is removed. In native NDN, after receiving a Data message it will be processed only if one or more relevant entries are present in the PIT. If no relevant P I T E is found, the received Data message will be considered unsolicited. Unsolicited messages are simply dropped in native NDN. If a relevant P I T E is found, the content is stored in the cache before forwarding the Data message. Content admission, lifetime, and replacement are governed by the cache admission and replacement policy.
The consumer vehicle after transmitting the Interest packet waits for a specified period of time for the Data packet. After a specific time period (Retransmission Time Out (RTO)), the consumer retransmits the Interest packet. Consumer vehicles are allowed to make retry attempts before discarding the Interest. Furthermore, in NDN, it is considered that Data packets follow the reverse forwarding paths of Interest packets. In a highly dynamic environment, if the Interest packet kept on moving forward due to the reason that it is not hitting the content provider/producer, then it may be difficult for the Data to be traversed on the same reverse-path as the PEL might have expired on the intermediate vehicles. In native NDN, receiving a Data packet after its PEL expiry is deemed unsolicited. For PIT, a search string prefix-matching algorithm is used, which takes longer due to the large and variable size of the content name. The large size of the PIT will exacerbate the search delay, making it unsuitable for the dissemination of safety content.

4. Current State-of-the-Art Schemes

The state-of-the-art PIT management schemes can be broadly divided into two categories: (i) static management, (ii) adaptive management. Table 1 compares existing PIT management schemes. There exists very limited work addressing adaptive PIT management requirements in NDN-based VANETs.

4.1. Static PIT Management

There exists work [14,15,16,17,18,19] which considers static PEL. In [14,15,16,17,18,19], each forwarder vehicle stores the P I T E for the fixed duration of time. If the Data message is received after P I T E expiry, it will be considered as unsolicited.
Source-based communication schemes [14,15] involve communication overhead as they require vehicles to be aware of the topology and physical characteristics of nearby vehicles. Periodic Beacon messages are used to disseminate information. Each vehicle maintains tables and stores relevant information after receiving it from neighbours (such as speed, direction, and connectivity duration). The vehicle then uses the information in these tables to choose the best forwarder. In this way, the broadcast storm problem is addressed in source-based schemes.
Moreover, receiver-based forwarding schemes are also presented in the literature to avoid congestion in the not-safety applications [16,17,18]. Such schemes consider static PEL. The receiver-based forwarding scheme considers assigning priorities to the vehicles in the neighbourhood. A small waiting time is assigned to high-priority vehicles. The vehicle’s suitability to be selected as a forwarder is determined based on its probability in the least waiting time. The vehicle with the lowest deferred timer value is able to forward the Interest message first. All other neighbouring vehicles, upon overhearing the message with the same Nonce and Name (not present in the DeadNonceList), already scheduled for broadcast, stop their timer and back-off from broadcasting duplicate messages. This occurs, for example, in schemes where the forwarder is selected based on the distance to previous forwarder [16,17,18]. Compared to neighbouring vehicles, a lower deferred timer value is calculated for vehicles far from the previous forwarder vehicle. This deferred timer-based rebroadcast mechanism reduces message collision chances and lowers bandwidth usage. Ullah et al. [19] proposed a scheme for caching content near the consumer to reduce the content retrieval delay. This aims to reduce the overall number of PIT entries. The higher the ISR, the less time PIT will keep entries for. The scheme introduced three new fields in the Interest and Data packets: chunk-threshold, hop-count, and TTL. The content holder node inserts the number of pieces available with the content requested by the requester into the chunk threshold. The requester uses ChunkTHd as the priority for conducting Interest prefetching.
In a VANET dynamic environment, a high number of Interests and a large PEL can exhaust the PIT, impacting the overall ISR. In the case of using constant PEL, the PIT must keep the P I T E for its associated PEL duration. VANETs applications have varying latency requirements; exploiting similar PEL will not be feasible. With a static PEL, the size of the PIT may grow rapidly because all Interests may not be satisfied due to the unstable wireless environment. Moreover, considering parameters such as speed and direction, the vehicle with PITEs might not receive the Data message, resulting in an increase in the load on PIT. In V2V scenarios where the request is met by other vehicles, when the vehicle still holds the PITE, its performance will degrade due to the large PIT table. The large size of the PIT will exacerbate the search delay, making it unsuitable for the dissemination of safety content. This problem becomes worse in the case of P I T E long lifetimes, which increases the number of stale entries in PIT. Stale PIT entries not only waste PIT storage but also increase search time. PIT is a key player in finding content in NDN. Due to the limited opportunities offered by current memory technologies, PIT size is a bottleneck. PIT overflow results in service disruptions as new Interest messages cannot be added to PIT. It is also possible that a consumer vehicle changes its direction or speed and no longer remains within communication range of the intermediate forwarder vehicle, or that it moves away from the path traversed by the interest packet. Such events are very common in VANETs due to high mobility, especially in urban mobility scenarios. Moreover, a shorter PEL will also cause frequent re-requests by consumers, resulting in network congestion and increased ISD.

4.2. Adaptive PIT Management

There exists very limited work related to adaptive PIT management in NDN-based VANETs [20,21,22]. Bouk et al. [20] proposed an adaptive PEL scheme. Three information components were used: PEL, rate of decay, and ISR. Initially, the default PEL value was used. PEL depends on two constant information components that are input by consumers: PEL and rate of decay. In this work, no technical details were provided related to the computation of these constants. PEL is reduced at each forwarder vehicle in the upstream direction using the exponential decay model. The proposed scheme is impractical because it considers the fixed (static) initial PEL and the rate of decay.
Manisha et al. [21] proposed a scheme to compute the PEL adaptively at every vehicle, based on the total time duration required to transmit a packet to neighbours in one hop. Three different types of delays are considered: transmission delay, contention delay, and propagation delay. Different VANETs applications have different latency requirements. Additionally, VANETs characteristics make it very difficult to predict Round-Trip Time (RTT). It is believed that the RTT correctly predicts congestion in the end-to-end network path. When considering a wireless network, this belief may be incorrect. Because of channel fading, interference, and mobility, the quality of the radio link in wireless networks can vary greatly over time.
Bouk et al. in another paper [22] used hop count in the Interest message to limit the number of hops an Interest message can traverse. A Hop-limit-based adaptive PEL (LAPEL) scheme is presented for NDN-based VANETs. It computes a one-hop PEL based on the following parameters: contention window, (ii) back-off period, (iii) transmission delay, (iv) propagation delay. The concept of TTL is exploited for the following purposes: (i) to limit the Interest broadcast scope, and (ii) to estimate the PEL at each node. The decay rate between the consumer node and the last Interest-receiving node is adaptively computed using a logistic model. In a dynamic environment, it is very difficult to accurately estimate the time of the round trip.
The schemes presented in [21,22] do not consider forwarding (queuing) delay and processing delay in the model. Receiver-based schemes introduce delays (wait period) to address the broadcast storm problem (which results in congestion and contention). As the packets are delayed for an unknown amount of time, it is hard to predict position, hop count, and RTT. For example, in Duarte et al. [16], the Interest-forwarding vehicle is considered as the one which is farthest from the previous forwarder compared to neighbouring vehicles. The deferred time is calculated based on relative vehicle distance to the content provider/producer and network density. If the vehicle does not overhear the packet during the wait period, it forwards the packet upon timer expiry. In [23], the authors discussed that adaptive PEL schemes must consider the processing delays while computing the PEL. Not considering processing delays might result in the degradation of ISR in some applications. For example, non-trivial computing in NDN-based edge computing will affect the P I T E expiry time, leading to the degradation of ISR. Furthermore, in source-based forwarding schemes [14,15], the vehicle collects information from the neighbouring vehicles for forwarder selection. Afterwards, rankings of itself and neighbouring vehicles are computed to select the forwarder. This ultimately adds to processing delays.
Alubady et al. [24,25] proposed an adaptive PIT management solution for the emergency environment. The proposed scheme used a Smart Interest Lifetime (SIL) for PIT overflow management based on the network load. For network load calculation, an extra field termed face list is maintained in the PIT, which holds the number of Interests per interface. Two information components are exploited for PEL threshold computation: (i) the maximum number of Interests received on a particular interface, and (ii) the total number of entries in the PIT. In the event of PIT overload and similar Interest rates on all faces, the lifetime threshold is computed based on the average of PITEs lifetime in PIT. In the case of PIT overflow and dissimilar Interest rates on all the faces, the face with the maximum number of received Interests is considered. The lifetime threshold is calculated by taking the average of all P I T E lifetimes (received on face f). In the case of network overload, a shorter PEL value, i.e., a minimum of lifetime threshold and PEL, is considered. In [24,25], application type and scope are not considered while updating PEL.
Alubady et al. [26] proposed the Highest Lifetime Least Request (HLLR) protocol to optimize the PIT performance in case of high network traffic. In [27], the author proposed a P I T E replacement policy in CCN networks considering a natural disaster application scenario. In [10], the PIT entry replacement scheme is presented, which is based on the Highest Lifetime least Request Policy (HLLR) presented in [26,27]. Upon receiving the Interest, if the PIT is full, the P I T E with the longest remaining LT and the fewest requests is replaced with a new one. In the event of PIT overflow, the scheme replaces the P I T E for the upcoming Interest with the P I T E with a maximum lifespan and a minimum number of incoming faces. The replacement decision is based on the following components: (i) number of incoming interfaces, and (ii) Interest lifetime. The PIT replacement policy does not consider the time P I T E spent in the PIT as a factor in determining the lowest priority PITE ( P I T E in the PIT) to be replaced. It is possible that the P I T E in the PIT which is selected for removal might be close to satisfaction. The scheme may replace the P I T E in the PIT, which might be satisfied in the following few milliseconds. Not considering the time spent on each P I T E can affect PIT utilization. In [10], the P I T E adaptive lifetime policy is also presented, where the PEL is managed as follows. When the PIT is empty, the PEL threshold is set as an average of the value specified in the incoming Interest packet I n t e r e s t L i f e t i m e field and the default lifetime value. In case the PIT is not overflowed and not empty, the PEL threshold is updated by calculating the average PEL between the PEL threshold value and the value specified in the incoming Interest packet I n t e r e s t L i f e t i m e field.
PIT is an important player in NDN data retrieval. PIT size is the bottleneck due to the limited opportunities provided by current memory technologies. PEL adjustment is a critical challenge that can have an impact on overall network performance. There are adaptive PIT management schemes that use the following parameters to reduce the lifetime of the P I T E between the consumer node and the last Interest receiving node: hop count [20,22], Round-Trip Times (RTT) [20,21,22], and Interest Satisfaction Rate (ISR) [20]. In VANETs, the hop count, network density, and RTT [20,21,22] are unpredictable. Whereas ISR also depends on the underlying caching mechanism’s efficiency. Due to the transient communication nature, the time of vehicles’ interconnection cannot be predicted. Speed variation makes estimation of propagation delay difficult. To address the broadcast storm problem, receiver-based forwarding schemes introduce delays (waiting time) at each hop. As discussed above, receiver-based schemes introduced delays (wait period) to address congestion. As the packets are delayed at different hops for an unknown amount of time, it is hard to predict forwarding (queuing) delay and RTT. The presented schemes [21,22] do not consider queuing delay and processing delay in the model. Vehicles are mobile and pass through areas with different densities, topography features, and wireless conditions. This makes the prediction of contention delay difficult. Not considering processing delays might result in the degradation of ISR in some applications. Likewise, not considering the content type [10,26,27] while replacing P I T E could lead to life loss and disabilities.
Table 1. PIT Management Schemes in NDN-based VANETs.
Table 1. PIT Management Schemes in NDN-based VANETs.
Ref.PIT
Management
PIT Management Strategy Simulation
Environment
Limitations
[14,15]Static
Neighbour-based forwarding selection strategy
PIT entries are managed by selecting limited forwarder(s)
NS-2,
Highway scenario with mobility
Contention problem due to periodic Beacon overhead
Stale PIT entries in high density networks.
[16,17,18]Static
Receiver-based (position-based) forwarding.
PIT entries are managed by forwarder selection
ndnSIM,
Urban scenario with mobility
Stale PIT entries due to more chances of Reverse Path Partioning problem as distant neighbor is selected as forwarder.
[19]Static
To proactively cache the content near to the requester to reduce the number of PIT entries
ndnSIM, with infrastructure environment
Communication overhead due to extra fields in Interest/Data packets
Static PITE lifetime
Wastage of storage due to replication of content
[10]Adaptive
PITE Replacement policy is same as presented in [26,27].
Adaptive PEL scheme proposed
(i) When PIT not overflow
-
Threshold is set as an average of Interest LT and default LT.
(ii) When PIT is in overflow
PEL threshold is updated by calculating the average LT between the LT threshold value and the incoming packet LT.
ndnSIM
No mobility
Rocket fuel mapped topology
Application type, content type, application popularity not considered.
The received valid Interest PITE is replaced with the PITE in the PIT which might be about to be satisfied.
Type of content, and environmental conditions not considered.
[20]Adaptive
Adaptive PEL scheme based on three information components: PEL, decay rate, and ISR.
NS-2, Highway scenario with mobility
PEL depends on two constant information components that are input by consumer: PEL and rate of decay. No technical details are provided related to computation of these constants.
Proposed scheme is impractical as it considers fixed initial PEL and the decay rate.
[21]Adaptive
Adaptive PEL based on the total time duration required to transmit a packet to neighbours in 1 hop. Three types of delays are considered: Transmission delay, contention delay, and propagation delay.
ndnSIM, Highway scenario with mobility
Not considered processing and queuing delays
In VANETs, it is very challenging to predict round trip delay
[22]Adaptive
Hop-limit-based adaptive PEL scheme is presented for NDN-based VANETs.
It computes 1-hop PEL based on the following parameters: (i) contention window, (ii) backoff period, (iii) transmission delay, (iv) propagation delay.
NS-2,
Highway scenario with mobility
Based on hop count rather than type of content.
Specific application scenario is considered.
Queuing and processing delays are not considered while computing delay to adjust PEL.
[24,25]Adaptive
PEL updating of incoming Interest in the event of PIT overflow
In case of similar Interest rate on all faces, an average lifetime of all the PITEs in PIT is calculated to represent a new lifetime threshold
In case of dissimilar Interest rate on all the faces, the average lifetime of all PITEs for face f is calculated to represent lifetime threshold. Face f represents the face with maximum number of received Interests.
PEL of incoming Interest is set as minimum of PEL and lifetime threshold.
Not Discussed
Content type, spatial and temporal validity, and environmental conditions not considered while computing PEL of incoming Interest.
A dedicated scenario is considered.
Reducing the PEL for critical content might lead to loss.
Very short Interest lifetime of 80 ms [25]
[26,27]Adaptive
The PITE replacement policy replaces the PITE for the incoming Interest with the PITE in PIT with the lowest priority (maximum lifespan and a minimum number of incoming faces).
ndnSIM, grid-based scenario with no mobility
Dedicated scheme considering disaster not for general/infrastructure-less environment
The received valid Interest PITE is replaced with the PITE in the PIT which might be about to be satisfied. This in turn impacts PIT utilization.
Type of content and application popularity not considered.

5. Context-Aware Pending Information Table Entry Management (CPITEM) Scheme

Packet drop and delay in VANETs is common and can lead to a maximum number of stale PIT entries. Chances of Data packet loss are higher because of their size. The most important challenge in PIT management is to decide which P I T E to be replaced, or life decreased in case of PIT overload. Removing a P I T E might disrupt some critical services. Demand for safety and non-safety information in VANETs is increasing significantly. Drivers and passengers have a higher demand for traffic-related information, popular content as well as road entertainment applications, such as weather information, breaking news, streaming live videos, and downloading multimedia content. Different delivery priorities may be required. For example, video delivery to a vehicle required for safe driving (to raise awareness related to an area of interest under bad weather) should take precedence over the delivery of a recent cartoon for a child. The later video is less critical. This in turn requires that the P I T E for safety content be given priority over the P I T E for non-safety content. In the event of P I T S i z e > t h r e s h o l d ( θ ) , P I T E related to a safety application must not be replaced.
PIT management is critical for effective content distribution. To meet the latency requirements of VANET applications and effective management of PIT, PITEs must be prioritised. Furthermore, allocating priorities will aid in decision-making regarding P I T E replacement in the event of PIT overload. Considering VANET applications’ QoS requirements, assigning priority to P I T E is critical. However, the question is which components of information should be considered to prioritize PITEs.
The CPITEM scheme, therefore, provides the mechanisms for the context-aware P I T E replacement in case of P I T S i z e > t h r e s h o l d ( θ ) . In the VANETs, different applications have different QoS needs. In the proposed CPITEM scheme, the P I T E priority is calculated using the following information components: (i) Content type (safety/non-safety), (ii) Application popularity (demand of application), (iii) P I T E lifetime (PEL), (iv) P I T E size in terms of InRecords associated with PITE, and (v) duration of time P I T E stays in PIT (termed resting time in PIT). When a vehicle receives an Interest packet, it first checks the PIT. If it is valid message and there is a space in the PIT store, the P I T E will be stored directly. Otherwise, the CPITEM scheme computes the priority based on aforementioned components. If the received Interest priority is greater than the P I T E in the PIT with lowest priority, the P I T E in the PIT with lowest priority will be replaced with the P I T E for the received Interest. Otherwise, if the upcoming Interest has a lower priority than the P I T E in the PIT with the lowest priority, the newly received Interest will be dropped.
Likewise, the original NDN forwarding daemon, the consumer vehicle, sends an Interest message containing the default attributes including Nonce, I n t e r e s t L i f e t i m e , and hop count. Only the Data name is constructed based on our previously proposed context-aware content-naming scheme [9]. The CACN Data-naming scheme allows for the identification of both safety and non-safety contents. Furthermore, the CACN features a coding scheme that represents the majority of the content name components, allowing for addressing communication and storage complexity [9]. The CACN scheme allows for representing Content Type (CT), Content Scope (CS), and Application ID (AppID) information in the content name along with other information components. The CACN is divided into two partitions: (i) obligatory and (ii) supplementary. The information about the content is stored in the obligatory part. The context information considers the following information components: content type, content scope, content format, application, when, and where. Content type represents the kind of content, i.e., safety or non-safety. Content scope represents the scope of the content, i.e., local or global. The content field represents content format, which is divided into four categories: text, audio, image, and video. The application component uniquely identifies the VANETs application.

5.1. Content Type

Non-safety applications aim to improve the comfort levels of drivers and passengers and make travel more pleasant. Compared to safety applications, most of the non-safety applications do not have stringent low-latency requirements. On the contrary, the quality of service (QoS) required by the safety apps is close to real-time. Delaying the dissemination of information in some safety applications can lead to loss of life and disability. These applications and services are bound to low-latency needs. Therefore, considering the type of content plays an important role in prioritizing PITE. Most of the safety applications do have local CS as they have limited spatial validity. In addition, these applications have limited time validity, after which the content is not considered valuable. Considering time validity, safety content PEL would be short compared to non-safety content. Therefore, safety content will create less load on PIT compared to non-safety content. The content type attribute in the CACN can be exploited to compute the content type of content requested in the Interest message. If in the Interest name the CT is specified as safety, then that P I T E should be given priority over the non-safety content PITE. Additionally, unlike [10,24,25], its lifetime also should not be reduced. In case of PIT overload, if the received valid Interest is related to safety content, its P I T E must be replaced with existing P I T E of non-popular, low-rated, non-safety content.

5.2. Non-Safety PITE Priority

In our proposed CPITEM scheme, in the event of PIT overload, if the received Interest i   P I T E ( P I T E i ) does not already exist in the PIT and the application type is non-safety, the P I T E i will be replaced with existing non-safety P I T E j having lowest priority. In case all the entries in the PIT have higher priority compared to the priority of incoming Interest, the P I T E i will be dropped. The P I T E priority is computed considering the following information components: (i) Eminence of the P I T E i ( E m i n e n c e P I T E i ) , (ii) P I T E i Utility ( U t i l i t y P I T E i ), (iii) Application priority ( U t i l i t y _ A p p i t r ).
Upon receiving an Interest packet, PIT is searched for in the existing entry. If no P I T E is found, entry is created along with the incoming interface (InFace). If the P I T E exists and has an InRecord with a similar content name and Nonce, then the Interest packet is simply discarded. On the other hand, if the P I T E exists and has an InRecord with a different Nonce but with the same content name, then the aggregation of InFace and Nonce takes place in the P I T E . When a new valid Interest for the same name arrives, InRecord is added to the P I T E .

5.2.1. Eminence

E m i n e n c e P I T E i is computed using Equation (1) considering the information components: (i) remaining lifetime of P I T E i ( P E L P I T E i ) , (ii) size of the P I T E i   ( S i z e P I T E i ) , (iii) remaining lifetime and size of all entries in the PIT. S i z e P I T E i is the number of InRecords associated with a P I T E i , representing the current demand for the content. Eminence represents the popularity of P I T E by considering both P I T E size and PEL. To compute the popularity of the current PITE, we have to divide it by the summation of the product of the size and PEL of all PIT entries ( j = 1 k ( S i z e P I T E j   P E L P I T E j ) . If two PITEs have equal PEL ( P E L P I T E j = = P E L P I T E i ) , lower E m i n e n c e value is calculated for the P I T E with smaller size (less number of InRecords), whereas higher E m i n e n c e   value   is calculated for the P I T E   with   larger   size . Some of the PITEs may have a large size and a large PEL, resulting in a higher Eminence value, which creates a load on the PIT. Therefore, P I T E utility (Equation (2)) is computed to prioritise those PITEs that have a large size but have spent more time in PIT. If two PIT entries P I T E i , and P I T E j have nearly equal Eminence values, then a higher Utility value will be computed for P I T E which rests in PIT for a longer duration. This is due to the fact that the entries that spend a longer time in PIT might be resolved sooner. Consequently, the PIT storage will be available for the upcoming PIT entries. This in turn will improve PIT utilization. The Eminence of the P I T E is computed as follows.
E m i n e n c e P I T E i = ( S i z e P I T E i   P E L P I T E i ) j = 1 k ( S i z e P I T E j   P E L P I T E j )

5.2.2. Utility

The P I T E i Utility is computed using Equation (2), considering E m i n e n c e P I T E i , rested time in PIT by the P I T E i ( R T P I T E i ), and P E L P I T E i . U t i l i t y P I T E i takes into account PIT utilization. The P I T E i which has spent more time in PIT is given preference. This in turn will not only help to reduce average Interest Satisfaction Delay (ISD) but also PIT utilization. The P I T E i   w i t h   a   l a r g e   S i z e P I T E i and R T P I T E i , will be given high priority. If two PIT entries P I T E i , and P I T E j have same size ( S i z e P I T E i = = S i z e P I T E j ) , then P I T E which rested in PIT for a longer duration will be given a higher utility.
U t i l i t y P I T E i = E m i n e n c e P I T E i ( P E L P I T E i / R T P I T E i )

5.2.3. Application Popularity

The application attribute in the CACN can be exploited to compute the application ID of content requested in the Interest message. The popularity of the non-safety application A p p i indicates whether the content requested by the consumer vehicle is in demand in the geographic region. If the application A p p i is popular, it indicates that the P I T E associated with it is more valuable and relevant. Likewise, there is a greater likelihood of obtaining the content in the vicinity. Application popularity may be calculated based on the number of Interests received during a certain time period on the face(s). CACN with its coding scheme can represent a wide range of safety and non-safety applications. For this purpose, the AppID information component is exploited. Since vehicles in the VANETs are mobile, passing through different geographical areas, different applications contents can be in demand. Moreover, an application may be popular for a certain time and then may be disregarded in a spatial region. If the scheme assigns equal weightage to the Interest messages received over time, requests for popular content may not be addressed. It would be difficult to differentiate between the situation whether the application is high in demand currently or was in demand previously. Let us consider an example scenario, the application A p p i is highly demanded (a large number of Interest messages received) at a certain time period while moving through some geographical area. After the passage of some time t 2 , let us consider that a large number of requests are received for application A p p j , but no additional Interests are received for A p p i . If the count of Interests received for A p p i is greater than A p p j , it will still be considered as a highly demanded application. As a result, when calculating application priority, the time-sensitivity requirement must be taken into account. If the time-sensitivity requirement is not taken into account, it would be difficult to differentiate between whether the application is high in demand currently or was in demand previously.
The time sliding window [28,29] is used to address the time-sensitivity requirement when calculating application popularity. Let us consider that for an application A p p i recent time window A p p i _ t r , the dimension is in the form [FROM Start, TO End]. Each record in the time window is kept for the duration t using time unit (SECOND (s), MINUTES (m)). When a vehicle receives an Interest, considering its arrival time, its expiry time is calculated and it will store a tuple in the A p p i _ t r . At the expiry of the timer associated with each entry in A p p i _ t r , the entry will be removed from the A p p i _ t r .
Let us consider that the current PIT entries for non-safety content belongs to n applications. Application priority is represented with Utility of A p p i at time t ( U t i l i t y _ A p p i t r ) . The U t i l i t y _ A p p i t r is calculated using Equation (3). U t i l i t y _ A p p i t represents the current demand of an application A p p i . I n t f r e q _ A p p i represents the number of valid Interests received for A p p i in time window A p p i _ t r . m = 1 m = n I n t f r e q _ A p p m represents the count of valid Interest messages received for each of the n applications in the recent time period t .
U t i l i t y _ A p p i t r = I n t f r e q _ A p p i t r m = 1 m = n I n t f r e q _ A p p m t r
U t i l i t y _ A p p i t r denotes the relationship or comparison between the Interest messages received for a specific application and the total number of Interest messages received for all applications. It compares the two quantities with respect to each other. Higher U t i l i t y _ A p p i t r is calculated for an application ( A p p i ) for which a larger number of Interest messages are received compared to an application with a lower number of Interest messages.

5.2.4. PITE Priority

By taking both U t i l i t y P I T E i and the popularity of the application ( U t i l i t y _ A p p i t r ), the priority of the P I T E i is computed using Equation (4). P r i o r i t y P I T E i considers both application utility and P I T E utility. If two PIT entries have the same size and application utility, then in the event of overload, the P I T E that rested in PIT for a shorter period of time will be chosen for replacement.
P r i o r i t y P I T E i = U t i l i t y P I T E i + U t i l i t y _ A p p i t r
Furthermore, the following algorithms (Algorithms 1–3) related to the CPITEM scheme are presented, which are executed at the reception of Interest messages.
Algorithm 1: Context-aware PIT Entry Management (CPITEM) Protocol
1  // Interest message (IntMsg) include content name (CACN)
2  Upon Receiving IntMsg
3   nonce ←IntMsg.Nonce
4   interestName ←IntMsg.Name
5   FaceIntMsg.InFace
6   AppIDGetAppID(interestName)
7   If (ValidPITEExistsInPIT(interestName) == False)
8    //Associate time t with new entry related to Application
9    UpdateAppInf(AppID,CurrentTime(),t)
10      If ((ContentInCache(interestName) == False))
11      If PITSize(PIT) < threshold
12        AddPITE(IntMsg)
13        Set IntMsg to Forward
14        E l s e
15        Contextaware_PITE_Replacement(IntMsg)
16      Else
17        Construct Data message and forward
18   Else
19      If (PITEExistsinPIT(interestName) == True)
20       PITESearchPITE(IntMsg)
21       If (ValidInRecord(interestName,Nonce,Face,PITE) == True)
22         AddInRecToPITE(PITE)
23         //Associate time with new entry related to Application and add it to related time window
24         UpdateAppInf(AppID,CurrentTime(),t
When an Interest is received, its Nonce and name are checked in the DeadNonceList. If the matching entry is found, the loop is suspected and the Interest is considered invalid. If a matching Nonce is not found in the DeadNonceList, it searches PIT for the existing entry (Line 7, Algorithm 1). When a valid Interest is received for which no P I T E already exists and related content is not present in the cache, the PIT size is checked. If the PIT size is less than a predefined threshold, the P I T E is created and stored in the PIT. Otherwise, the Contextaware_PITE_Replacement method (Algorithm 2) is executed. If the required content is found in the cache, the Data message is forwarded with the relevant content, and finally, P I T E is removed. For each valid Interest, the corresponding application window is also updated by adding a time-bound application-related tuple (Line 9, Algorithm 1). If the P I T E already exists, the incoming interest Nonce and face is checked against the existing P I T E before it is processed further. If a similar Nonce is not found, the Interest is considered as a new valid Interest and InRecord will be added to the corresponding P I T E (Lines 21–22, Algorithm 1). When a new valid Interest is received, its application ID (AppID) is checked from CACN. Afterwards, after associating the time t, the tuple is added to the relevant application time window. The tuple will be removed from the corresponding time window after the expiry of time.
A l g o r i t h m   2 :   Contextaware _ PITE _ Replacement   ( IntMsg )
1   / /   I n t e r e s t   m e s s a g e   ( I n t M s g )   i n c l u d e   c o n t e n t   n a m e   ( C A C N )
2               i n t e r e s t N a m e IntMsg . N a m e
3      C T G e t C o n t e n t T y p e ( i n t e r e s t N a m e )
4      I f   ( C T = = S a f e t y )
5       P I T E ,   P r i o r i t y   L o w P r i o r i t y N o n S a f e t y P I T E ( )
6      If ( P I T E   ! = N u l l )
7                   R e m o v e P I T E i n P I T ( P I T E )
8      A d d P I T E I n P I T ( IntMsg )
9       Set     IntMsg     t o   F o r w a r d
10     Else
11      // All PITE are related to safety in PIT. No space for new entry
12      Discard( IntMsg )
13     Else
14       P I T E ,   P r i o r i t y   L o w P r i o r i t y N o n S a f e t y P I T E ( )
15       / /   Compute P r i o r i t y ( I n t M s g )   c o m p u t e s   r e c e n t     I n t M s g   P I T E   P r i o r i t y using Equation (4)
16       P r i o r i t y 1   Compute P r i o r i t y ( I n t M s g )
17      If ( P r i o r i t y 1 > P r i o r i t y )
18        R e m o v e P I T E i n P I T   ( P I T E )
19        A d d P I T E I n P I T ( IntMsg )
20         Set     IntMsg     t o   F o r w a r d      
21       Else
22       // All PITEs in PIT have high priority compared to received message PITE priority. No space for new entry
23        D i s c a r d ( I n t M s g )
If the content type is safety, low priority non-safety P I T E is searched in the PIT (Line 5, Algorithm 2). In our proposed CPITEM scheme, in the event of PIT overload (PIT size is greater than a certain threshold), if the received valid safety Interest P I T E does not already exist in the PIT, the P I T E will be replaced with the existing non-safety P I T E i in the PIT having the lowest priority. If all of the entries in the PIT are related to safety applications, the incoming Interest message ( I n t M s g ) will be simply dropped in the event of PIT overload (Line 12, Algorithm 2). If the received Interest message is of type non-safety (Line 13, Algorithm 1) the priority of the incoming Interest P I T E and priority of the lowest non-safety P I T E in the PIT will be compared. If the priority of the incoming Interest P I T E is greater than the priority returned by the method L o w P r i o r i t y N o n S a f e t y P I T E ( ) , then the corresponding P I T E in the PIT will be removed from the PIT. Afterwards, P I T E for the incoming Interest will be added (Line 19, Algorithm 2). C o m p u t e P r i o r i t y ( I n t M s g ) method computes the priority of incoming Interest P I T E considering Equation (4). Algorithm 3 illustrates the working of the L o w P r i o r i t y N o n S a f e t y P I T E ( ) method. If one or more non-safety P I T E s exist in the PIT, this method returns the lowest-priority non-safety P I T E reference and its priority. This method computes the priority of every P I T E in the PIT considering Equation (1) to Equation (4). Afterwards, the non-safety-content P I T E with the lowest priority is searched and returned.
Algorithm 3:  L o w P r i o r i t y N o n S a f e t y P I T E ( )
1     / /   I n t e r e s t   m e s s a g e   ( I n t M s g )   i n c l u d e   c o n t e n t   n a m e   ( C A C N )
2    P I T L o a d     0
3    i n t e r e s t N a m e IntMsg . N a m e
4              F o r   e a c h   P I T E j   P I T
5      P I T L o a d     P I T L o a d   +   ( S i z e P I T E j   P E L P I T E j )
6    L o w e s t P I T E P r i o r i t y     β   / /     β   i s   a   H i g h e s t   V a l u e
7    L o w e s t P I T E     N u l l
8    F o r   e a c h   P I T E i   P I T
9        A p p I D   G e t A p p I D ( i n t e r e s t N a m e )
10      E m i n e n c e P I T E i   ( S i z e P I T E i   P E L P I T E i ) P I T L o a d
11      U t i l i t y P I T E i   E m i n e n c e P I T E i (   P E L P I T E i / R T P I T E i )
12      / /   C o m p u t e   A p p l i c a t i o n   P o p u l a r i t y using Equation (3)
13      U t i l i t y _ A p p     C o m p u t e A p p U t i l i t y ( A p p I D )
14        P r i o r i t y P I T E i     U t i l i t y P I T E i + U t i l i t y _ A p p
15       If ( P r i o r i t y P I T E i <   L o w e s t P I T E P r i o r i t y )
16        L o w e s t P I T E P r i o r i t y   P r i o r i t y P I T E i
17        L o w e s t P I T E     P I T E ( P I T E i )
18    Return L o w e s t P I T E ,   L o w e s t P I T E P r i o r i t y

6. Performance Evaluation

For evaluation of our proposed scheme called the CPITEM protocol, which exploits the CACN naming scheme, we implemented it in n d n S I M [11]. We compare our scheme’s CPITEM performances with the HLLR [10,26,27]. A similar PIT-replacement scheme is presented in [10,26,27]. In the event of a PIT overflow in HLLR, the P I T E with the longest lifetime and fewest requests is replaced with a P I T E of the newly received Interest.
In case of CPITEM, likewise, the original NDN-forwarding daemon, the consumer vehicle, sends an Interest message containing the default attributes including Nonce, I n t e r e s t L i f e t i m e , and hop count. The Data name is constructed based on our previously proposed context-aware content-naming scheme [9]. The CACN Data-naming scheme allows for the identification of both safety and non-safety contents. Furthermore, the CACN features a coding scheme that represents the majority of the content name components, allowing for addressing communication and storage complexity [9]. To investigate the impact of shared communication channels, a highway traffic scenario is used to simulate the performance of the HLLR [11,12,13] and proposed CPITEM scheme. The highway scenario consists of a 10 km, four-lane road. In this scenario, the consumer vehicles transmit the Interest message to the vehicles in its neighbourhood. Two safety and four non-safety applications are considered. Consumers are requesting content by sending Interest messages, whereas the producers who have the required content send the relevant Data messages after receiving the Interest messages. Consumers and producers are both mobile. Six applications types are taken into account: post-crash application, work-zone application, file sharing application, commercial advertisement application, parking availability application, and traffic navigation map application.
Both schemes consider a pull-based scheme for obtaining the required content from the content holder. Just like in the work of [9], we assume that each vehicle is equipped with GPS, via which it obtains its location. Common parameter settings for all the experiments are depicted in Table 2. Producers, consumers, and forwarders are all mobile. Speed is assigned randomly to vehicles. Due to the variation in speed, a dynamic environment is generated that limits inter-connectivity between vehicles for a longer period of time.
There are seven producers, and each produces content related to a specific application. All the contents related to one application are stored on one producer. The producers are located at different positions on the highway between 1.1 km and 2.4 km. Safety content producers are located between 1.1 km and 1.35 km. Considering the time and spatial validity requirements of the applications, the producers of the safety content are placed closer to consumers (1.1 km) compared to the non-safety content (located at a distance between 1.3 km and 2.4 km). Therefore, the PIT entries for safety content are resolved a little earlier compared to non-safety content.
Two safety application contents and five non-safety application contents are considered. In Safety Content Application (SCA) scenarios, the consumers are sending Interest messages to request safety content related to applications SCA1 (Post crash) and SCA2 (work zone). Considering our proposed CACN scheme, two different safety content names are exploited for safety applications, which include: (i) S C A I   ( S a f e t y / L o c a l / T e x t / P o s t c r a s h : H e a d o n   C o l l i s i o n s / . ) , (ii) S C A I I   ( S a f e t y / L o c a l / T e x t /   R o a d   c o n g e s t i o n : W o r k   Z o n e / . ) . In Non-Safety Content Application (NSCA) scenarios, the consumers are sending Interest messages to request non-safety content related to applications such as NSCAIA (multimedia file sharing), NSCAIB (multimedia file sharing), NSCAII (commercial advertisement), NSCAIII (navigation map), and NSCAIII (parking availability). Considering our proposed CACN scheme, the five different non-safety content names considered for experimental evaluation are as follows: (i) N S C A I A   ( N o n S a f e t y / G l o b a l / A u d i o / M u l t i m e d i a   f i l e   s h a r i n g : M u s i c / . ) , (ii) N S C A I B   ( N o n S a f e t y   / G l o b a l / V i d e o / M u l t i m e d i a   f i l e   s h a r i n g : D r a m a / . ) , (iii) N S C A I I   ( N o n S a f e t y / L o c a l / T e x t / C o m m e r c i a l   A d v e r t i s e m e n t : H o t e l / . ) , (iv) N S C A I I I   ( N o n S a f e t y / L o c a l / P i c t o r i a l / N a v i g a t i o n   M a p : C i t y / . ) , and (v) N S C A I V   ( N o n S a f e t y / L o c a l / t e x t / P a r k i n g   a v a i l a b i l i t y : / . ). There are eight consumers who are requesting content at the same rate. In the case of the multimedia file sharing application, three consumers are sending Interests for two types of content (NSCAIA, NSCAIB). Two consumers are showing interest in NSCAIA content, and one consumer is interested in NSCAIB content. The multimedia file sharing application is the most popular application in the simulation scenario. The reason is that two different multimedia content types are demanded by a group of three different consumers. One of the other five consumers is interested in SCAI content; the second is interested in SCAII; the third in NSCAII; the fourth in NSCAIII; and the fifth in NSCAIV content. After every time t , the consumer vehicle sends the Interest packet for the different content related to similar applications. Like HLLR, the NDN default forwarding (Interest broadcast) scheme is used as a forwarding strategy in our experimental demonstration.

6.1. Experiment 1: Total Number of Drop Interest Messages Due to PIT Size as a Function of Growth in Interest Messages

This experiment is carried out to demonstrate the total number of dropped messages due to PIT overflow as a function of growth in Interest messages. The network comprises 130 vehicles, 8 of which are consumers, and 7 are producers. The PIT size, which represents the amount of available space in each vehicle in terms of PIT entries, is set at 30 entries. In Experiment 1, for the first point on the x-axis, the message generation rate is four messages/s. For the second, third, fourth, and fifth points, the message generation rate is five, six, seven, and eight messages per second, respectively. The number of messages transmitted varies from 1600 to 3200. When the number of messages transmitted is 1600, 400 messages are related to safety, 600 messages are related to popular non-safety, and 600 messages are related to non-popular non-safety content.
Upon receiving the Interest, each vehicle creates a P I T E if it is a valid Interest, and the P I T E does not already exist. Furthermore, only vehicles with matching PIT entries forward the Data message. Unsolicited messages are simply dropped. Figure 1 depicts how the implemented P I T E replacement schemes (HLLR [11], CPITEM) behave as the number of Interest messages in the network increases. Figure 1a depicts the overall number of dropped Interest messages as the number of Interest messages in the network increases. The number of dropped Interest messages for safety content is depicted in Figure 1b as a function of Interest message growth in the network. Figure 1c depicts the number of dropped non-safety Interest messages as a function of Interest message growth in the network. Figure 1d depicts the number of dropped non-safety, popular Interest messages in the network as a function of Interest message growth. The number of dropped Interest messages for non-safety, non-popular content is depicted in Figure 1e as a function of Interest message growth in the network. Figure 1f illustrates the average interest satisfaction delay of HLLR and CPITEM schemes in a VANET highway scenario as a function of Interest message growth in the network.
In this experimental scenario, the producer and consumer vehicles and all other vehicles are mobile. Therefore, the PIT entries are satisfied in a short period of time. To create a load on the PIT, the PIT size is considered small (30 entries). The proposed CPITEM scheme is able to prioritise the PIT entries based on application type (safety, non-safety), time rested in PIT, size (in terms of InRecords), and application popularity. In Figure 1, it can be seen that the proposed scheme prioritises the safety content over the non-safety content. Moreover, CPITEM prioritises popular, non-safety content over non-popular, non-safety content. CPITEM results in a lower number of messages being dropped compared to HLLR. The reason is that a CPITEM drops the incoming Interest if its priority is lower than the lowest priority P I T E in the PIT.
To make the multimedia application popular, more Interests are transmitted related to the application compared to other safety and non-safety non-popular applications. Three consumers are sending Interests related to multimedia applications. The PIT size is considered small to create a load on the PIT as vehicles are mobile. In the event of a PIT size being above a certain threshold, CPITEM tries its best to replace the newly received safety content Interest message P I T E with non-popular content PITE, as shown in Figure 1b. However, in the event that all entries in the PIT are related to popular non-safety content, the lowest priority popular P I T E is replaced with a safety content P I T E . Moreover, the PIT size is very limited, and when it is full of popular content entries, the upcoming popular content Interest P I T E cannot be placed in the PIT. Therefore, it will be dropped. In Figure 1d, it can be seen that for the CPITEM scheme, some of the PIT entries related to popular content are dropped (due to PIT size) when the load on the network in terms of Interest messages increases.
HRRL, upon receiving each new valid Interest message, replaces one of the existing P I T E with the new one, in case of PIT overflow. The HLLR scheme replaces the P I T E for the upcoming Interest with the P I T E in the PIT with a maximum lifespan and a minimum number of incoming faces. It does not take into account the time P I T E spend in the PIT, waiting for the Data packet. This impacts PIT utilization. It is possible that the P I T E in the PIT which is selected for removal might be closed to satisfaction, as it is waiting for a long time. Moreover, the newly received Interest P I T E priority is not considered. It is always replaced with the existing lowest priority entry (with a maximum lifespan and a minimum number of incoming faces) in the PIT. It can be seen that due to these reasons, the HRRL results in more PIT entries being dropped compared to the CPITEM. Figure 1f illustrates the average interest satisfaction delay of HLLR and CPITEM schemes in a VANET highway scenario. It can be seen that CPITEM results in lower average ISD compared to HLLR.

6.2. Experiment 2: Effect of PIT Size

The experiment is conducted to demonstrate the behaviour of CPITEM as a function of growth in PIT size. The network comprises 130 vehicles, 8 of which are consumers, and 7 are producers. Consumers are transmitting Interest messages at a rate of six messages per second. The number of messages transmitted is 2400, with 600 related to safety, 900 related to popular, non-safety and 900 related to non-popular, non-safety content. The PIT size, which represents the amount of available space in each vehicle in terms of PIT entries, varies from 20 to 60 entries. Upon receiving the valid Interest, each vehicle creates a P I T E if the P I T E does not exist and PIT size is above certain threshold. Furthermore, only vehicles with matching PIT entries forward the Data message. Unsolicited messages are simply dropped.
Figure 2 depicts how the CPITEM and HLLR (implemented P I T E replacement scheme) behave as the PIT size grows. The number of overall Interest messages dropped as a function of increase in PIT size is depicted in Figure 2a. Figure 2b depicts the number of safety Interests messages dropped as a function of PIT size. Figure 2c depicts the number of non-popular, non-safety contents dropped as a function PIT size variation. Figure 2d depicts the number of popular Interest messages dropped as a function of PIT size variation. Figure 2e depicts ISD as a function of PIT size growth.
Figure 2 demonstrates that considering the load on the network in terms of Interest messages, the CPITEM scheme performs efficiently. Considering the static load and by increasing the PIT size, the number of dropped messages reduces both for CPITEM and HLLR schemes. CPITEM intelligently prioritises the safety content over the non-safety content. No safety related content is dropped by CPITEM. Moreover, CPITEM also prioritises popular content over non-popular content. CPITEM results in reduced average ISD compared to HLLR. HLLR is incapable of distinguishing between safety and non-safety content, as well as popular and non-popular non-safety content.

7. Conclusions

The Pending Information Table (PIT) is an important component of the NDN content discovery process. Due to the limited capabilities of today’s memory technologies, PIT size is a bottleneck. Packet loss and delays are typical in VANETs, resulting in a maximum number of stale P I T E s . PIT overflow results in service disruptions as new P I T E s (of incoming interests) cannot be added to PIT. In VANETs, applications under the safety subgroup include time-sensitive applications. The utility of pertinent information is lost if it is not delivered on time. Safety applications demand near-real-time quality of service. In PIT management, the most important challenge is to decide which P I T E to be replaced in the event of PIT overload. Removing the P I T E might disrupt some critical services. The current state-of-the-art PIT management schemes remove PIT entries of low priority to make room for incoming Interest messages PITEs. When computing priority, the current state-of-the-art method ignores context such as application type, time rested in PIT, and content type. In this work, we proposed a Context-aware PIT Entry Management (CPITEM) protocol for NDN-based VANETs. It manages the PIT table by taking into account information components such as content type, P I T E lifetime, P I T E size, time for which P I T E rested in the PIT, and application popularity. To demonstrate that the proposed CPITEM scheme is efficient and effective, a set of simulations are run and compared to a benchmark scheme.

Author Contributions

Conceptualization, W.U.I.Z. and F.J.; methodology, S.G., W.A., W.U.I.Z., M.A.U.R., F.J.; software, W.U.I.Z., M.A.U.R. and F.J.; validation, W.U.I.Z., M.A.U.R., Z.R., W.A., S.G. and F.J.; formal analysis, W.U.I.Z., M.A.U.R., F.J., S.G., W.A. and Z.R.; investigation, W.U.I.Z., M.A.U.R., Z.R. and F.J.; resources, W.U.I.Z., M.A.U.R., F.J., S.G., W.A. and Z.R.; data curation, S.G., W.A., W.U.I.Z., M.A.U.R., F.J.; writing—original draft preparation, W.U.I.Z., M.A.U.R. and F.J.; writing—review and editing, W.U.I.Z., M.A.U.R., F.J., S.G., W.A. and Z.R.; visualization, W.U.I.Z., M.A.U.R., F.J., S.G., W.A. and Z.R.; supervision, F.J.; project administration, W.U.I.Z., M.A.U.R., F.J., S.G., W.A. and Z.R.; funding acquisition, S.G. and W.A. All authors have read and agreed to the published version of the manuscript.

Funding

“Research Center of the Female Scientific and Medical Colleges”, Deanship of Scientific Research, King Saud University.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Shladover, S.E. Connected and automated vehicle systems: Introduction and overview. J. Transp. Syst. 2018, 22, 190–200. [Google Scholar] [CrossRef]
  2. Eze, E.C.; Zhang, S.-J.; Liu, E.-J.; Eze, J.C. Advances in vehicular ad-hoc networks (VANETs): Challenges and road-map for future development. Int. J. Autom. Comput. 2016, 13, 1–18. [Google Scholar] [CrossRef] [Green Version]
  3. Jeong, J. IP-Based Vehicular Networking. 2017. Available online: https://tools.ietf.org/id/draft-ietf-ipwave-vehicular-networking-01.html#rfc.section.4 (accessed on 8 July 2021).
  4. Arshad, S.; Azam, M.A.; Rehmani, M.H.; Loo, J. Recent Advances in Information-Centric Networking-Based Internet of Things (ICN-IoT). IEEE Internet Things J. 2018, 6, 2128–2158. [Google Scholar] [CrossRef] [Green Version]
  5. Khelifi, H.; Luo, S.; Nour, B.; Moungla, H.; Faheem, Y.; Hussain, R.; Ksentini, A. Named Data Networking in Vehicular Ad Hoc Networks: State-of-the-Art and Challenges. IEEE Commun. Surv. Tutor. 2019, 22, 320–351. [Google Scholar] [CrossRef] [Green Version]
  6. Fang, C.; Yao, H.; Wang, Z.; Wu, W.; Jin, X.; Yu, F.R. A Survey of Mobile Information-Centric Networking: Research Issues and Challenges. IEEE Commun. Surv. Tutor. 2018, 20, 2353–2371. [Google Scholar] [CrossRef]
  7. Wang, X. (Ed.) Mobile Ad-Hoc Networks: Applications; IntechOpen: London, UK, 2011. [Google Scholar] [CrossRef]
  8. Kukliński, S.; Wolny, G. CARAVAN: A Context-AwaRe Architecture for VANET. In Mobile Ad-Hoc Networks: Applications; IntechOpen: London, UK, 2011. [Google Scholar] [CrossRef] [Green Version]
  9. Zafar, W.; Rehman, M.; Jabeen, F.; Kim, B.-S.; Rehman, Z. Context-Aware Naming and Forwarding in NDN-Based VANETs. Sensors 2021, 21, 4629. [Google Scholar] [CrossRef] [PubMed]
  10. Alubady, R.; Hassan, S.; Habbal, A. Pending interest table control management in Named Data Network. J. Netw. Comput. Appl. 2018, 111, 99–116. [Google Scholar] [CrossRef]
  11. Mastorakis, S.; Afanasyev, A.; Zhang, L. On the evolution of ndnSIM: An open-source simulator for NDN experimentation. ACM SIGCOMM Comput. Commun. Rev. 2017, 47, 19–33. [Google Scholar] [CrossRef]
  12. Named Data Networking Forwarding Daemon (NFD) 0.7.1 Documentation. 2020. Available online: https://named-data.net/doc/NFD/current/ (accessed on 1 February 2022).
  13. API Documentation: ns3::ndn::Consumer Class Reference. 2021. Available online: https://ndnsim.net/2.0/doxygen/classns3_1_1ndn_1_1Consumer.html (accessed on 11 October 2021).
  14. Ahmed, S.H.; Bouk, S.H.; Kim, D. RUFS: RobUst Forwarder Selection in Vehicular Content-Centric Networks. IEEE Commun. Lett. 2015, 19, 1616–1619. [Google Scholar] [CrossRef]
  15. Ahmed, S.H.; Bouk, S.H.; Yaqub, M.A.; Kim, D.; Song, H. DIFS: Distributed Interest Forwarder Selection in Vehicular Named Data Networks. IEEE Trans. Intell. Transp. Syst. 2017, 19, 3076–3080. [Google Scholar] [CrossRef]
  16. Duarte, J.M.; Braun, T.; Villas, L.A. MobiVNDN: A distributed framework to support mobility in vehicular named-data networking. Ad Hoc Netw. 2018, 82, 77–90. [Google Scholar] [CrossRef]
  17. Li, Y.; Shi, X.; Lindgren, A.; Hu, Z.; Zhang, P.; Jin, D.; Zhou, Y. Context-Aware Data Dissemination for ICN-Based Vehicular Ad Hoc Networks. Information 2018, 9, 263. [Google Scholar] [CrossRef] [Green Version]
  18. Deng, G.; Xie, X.; Shi, L.; Li, R. Hybrid information forwarding in VANETs through named data networking. In Proceedings of the 2015 IEEE 26th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC), Virtual, 13–16 September 2021; pp. 1940–1944. [Google Scholar]
  19. Ullah, R.; Rehman, M.A.U.; Kim, B.-S.; Hwang, S.O. RAPEL: Robust and Adaptive method for PIT Entry Lifetime in Wireless Content-Centric Networks. In Proceedings of the 2019 Eleventh International Conference on Ubiquitous and Future Networks (ICUFN), Zagreb, Croatia, 2–5 July 2019; pp. 346–351. [Google Scholar]
  20. Bouk, S.H.; Ahmed, S.H.; Yaqub, M.A.; Kim, D.; Gerla, M. DPEL: Dynamic PIT Entry Lifetime in Vehicular Named Data Networks. IEEE Commun. Lett. 2016, 20, 336–339. [Google Scholar] [CrossRef]
  21. Manisha, G.; Selvan, G.E.; Ramkumar, M. Pending interest lifetime mechanism for vehicular named data networks. In Proceedings of the 2019 International Conference on Vision Towards Emerging Trends in Communication and Networking (ViTECoN), Vellore, India, 30–31 March 2019; pp. 1–6. [Google Scholar]
  22. Bouk, S.H.; Ahmed, S.H.; Kim, D.; Park, K.-J.; Eun, Y.; Lloret, J. LAPEL: Hop Limit Based Adaptive PIT Entry Lifetime for Vehicular Named Data Networks. IEEE Trans. Veh. Technol. 2018, 67, 5546–5557. [Google Scholar] [CrossRef]
  23. Ullah, R.; Rehman, M.A.U.; Kim, B.-S.; Sonkoly, B.; Tapolcai, J. On pending interest table in named data networking based edge computing: The case of mobile augmented reality. In Proceedings of the 2019 Eleventh International Conference on Ubiquitous and Future Networks (ICUFN), Split, Croatia, 2–5 July 2019; pp. 263–265. [Google Scholar]
  24. Alubady, R.; Hassan, S.; Habbal, A. Adaptive Interest Packet Lifetime Due to Pending Interest Table Overflow. Adv. Sci. Lett. 2017, 23, 5573–5577. [Google Scholar] [CrossRef]
  25. Alubady, R.; Hassan, S.; Habbal, A. Adaptive interest lifetime in named data networking to support disaster area. J. Telecommun. Electron. Comput. Eng. 2018, 10, 29–34. [Google Scholar]
  26. Alubady, R.; Hassan, S.; Habbal, A. HLLR: Highest lifetime least request policy for high performance pending interest table. In Proceedings of the 2016 IEEE Conference on Open Systems (ICOS), Langkawi Island, Malaysia, 10–12 October 2016; pp. 42–47. [Google Scholar]
  27. Alubady, R.; Abdalhadi, S.; Kamil, W.A. Enhancing Replacement Policy of Content-Centric Networking to Support Reaction toward Natural Disaster. Int. J. Eng. Technol. 2018, 7, 812. [Google Scholar] [CrossRef] [Green Version]
  28. Aref, W.G. Window-based Query Processing. In Encyclopedia of Database Systems; Liu, L., Özsu, M.T., Eds.; Springer: Boston, MA, USA, 2009. [Google Scholar] [CrossRef]
  29. Brenninkmeijer, C.Y.A.; Galpin, I.; Fernandes, A.A.A.; Paton, N.W. A Semantics for a Query Language over Sensors, Streams and Relations. In Sharing Data, Information and Knowledge. BNCOD 2008. Lecture Notes in Computer Science; Gray, A., Jeffery, K., Shao, J., Eds.; Springer: Berlin/Heidelberg, Germany, 2008; Volume 5071. [Google Scholar] [CrossRef] [Green Version]
  30. Bian, C.; Zhao, T.; Li, X.; Yan, W. Boosting named data networking for data dissemination in urban VANET scenarios. Veh. Commun. 2015, 2, 195–207. [Google Scholar] [CrossRef]
  31. Niari, A.K.; Berangi, R.; Fathy, M. ECCN: An extended CCN architecture to improve data access in vehicular content-centric network. J. Supercomput. 2017, 74, 205–221. [Google Scholar] [CrossRef]
Figure 1. Experiment 1: total number of drop Interest messages as a function of growth in interest messages. (a) Overall Interest messages dropped as a function of Interest message growth in the network, (b) Interest messages related to safety dropped as a function of Interest message growth in the network, (c) interest messages related to non-safety dropped as a function of Interest message growth in the network, (d) Interest messages related to popular, non-safety content dropped as the number of Interest messages in the network increases (e) Interest messages related to non-popular, non-safety content dropped as a function of Interest message growth in the network, (f) average interest satisfaction delay.
Figure 1. Experiment 1: total number of drop Interest messages as a function of growth in interest messages. (a) Overall Interest messages dropped as a function of Interest message growth in the network, (b) Interest messages related to safety dropped as a function of Interest message growth in the network, (c) interest messages related to non-safety dropped as a function of Interest message growth in the network, (d) Interest messages related to popular, non-safety content dropped as the number of Interest messages in the network increases (e) Interest messages related to non-popular, non-safety content dropped as a function of Interest message growth in the network, (f) average interest satisfaction delay.
Sensors 22 04189 g001
Figure 2. Experiment 2: Effect of PIT size. (a) Overall Interest messages dropped due to PIT size, (b) Interest messages related to safety dropped due to PIT size, (c) Interest messages related to non-popular, non-safety dropped due to PIT size, (d) Interest messages related to popular, non-safety content dropped due to PIT size, (e) average ISD.
Figure 2. Experiment 2: Effect of PIT size. (a) Overall Interest messages dropped due to PIT size, (b) Interest messages related to safety dropped due to PIT size, (c) Interest messages related to non-popular, non-safety dropped due to PIT size, (d) Interest messages related to popular, non-safety content dropped due to PIT size, (e) average ISD.
Sensors 22 04189 g002
Table 2. Common Configuration Parameters.
Table 2. Common Configuration Parameters.
ParametersValue
Vehicle   Radio   Range   ( R R m a x ) 150 m
Producer Vehicle 7 (unless specified otherwise)
Propagation Loss Model
  • Nakagami propagation loss model
  • Range propagation loss model
Propagation Delay Model
  • Highway
  • Constant speed propagation delay model
Producer vehicle placement
  • Highway
  • Within the initial distance of 1.9 km
  • Safety producers (1.1 km) (located at a distance of 1.5 km and 1.9 km)
Network density130 vehicles (unless specified otherwise)
Road length10 km
Replacement PolicyLRU
Caching PolicyLCE
T x P o w e r S t a r t 5   ( d b m )
T x P o w e r E n d 5   ( d b m )
PEL 4 s
Speed Variation20 (70–90 km/h) [30,31]
Consumer vehicle8
Simulation time500 s for each experiment
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Zafar, W.U.I.; Rehman, M.A.U.; Jabeen, F.; Ghouzali, S.; Rehman, Z.; Abdul, W. Context-Aware Pending Interest Table Management Scheme for NDN-Based VANETs. Sensors 2022, 22, 4189. https://doi.org/10.3390/s22114189

AMA Style

Zafar WUI, Rehman MAU, Jabeen F, Ghouzali S, Rehman Z, Abdul W. Context-Aware Pending Interest Table Management Scheme for NDN-Based VANETs. Sensors. 2022; 22(11):4189. https://doi.org/10.3390/s22114189

Chicago/Turabian Style

Zafar, Waseeq Ul Islam, Muhammad Atif Ur Rehman, Farhana Jabeen, Sanaa Ghouzali, Zobia Rehman, and Wadood Abdul. 2022. "Context-Aware Pending Interest Table Management Scheme for NDN-Based VANETs" Sensors 22, no. 11: 4189. https://doi.org/10.3390/s22114189

APA Style

Zafar, W. U. I., Rehman, M. A. U., Jabeen, F., Ghouzali, S., Rehman, Z., & Abdul, W. (2022). Context-Aware Pending Interest Table Management Scheme for NDN-Based VANETs. Sensors, 22(11), 4189. https://doi.org/10.3390/s22114189

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop