期刊文献+

命名数据网络中的一种冗余控制策略

Redundant control strategy in named data networking
下载PDF
导出
摘要 命名数据网络(named data networking,NDN)作为一种新型网络架构,支持多路径转发和网内缓存,使得网络中存在大量冗余数据,会大大增加拥塞可能性。为解决上述问题,以减少兴趣包和数据包的转发数量为出发点,提出了基于扩展链路状态通告(extended link state advertisements,ELSA)的冗余控制算法(ELSA-based redundant control,ELSA-RC)。该算法一方面在路由节点新添一个跳数数据库(hop DB)来保存兴趣包的最新跳数,并通过发送ELSA以增强邻居节点的hop DB更新,从而降低兴趣包转发深度;另一方面,基于待定请求表的接口信息和收到的ELSA消息来阻止重复数据包的返回。基于ndn SIM的仿真结果表明,相较传统NDN,采用ELSARC后兴趣包和数据包的传输数量分别减少了约15%和26%,平均时延减少了约14%。因此,使用ELSA-RC能显著减少兴趣包和数据包在网络中的无效扩散和重复传输,同时还能降低网络时延,使NDN性能得到提高。 Named data networking(NDN),as a new network architecture,inherently supports multipath forwarding and in-network caching,which results in a large amount of redundant data in the network and greatly increases congestion.Based on extended link state advertisements(ELSA),this paper proposed a kind of ELSA-based redundant control(ELSA-RC)method to reduce the number of redundant interest and data packets.The algorithm added a hop count database(hopDB)in the NDN nodes to record the latest hop count of interest,and then reduced the interest forwarding by sending ELSA to enhance the hopDB update of neighbor node.In addition,ELSA-RC prevented redundant data from returning based on the incoming interface of pending interest table and received ELSA.The simulation results based on ndnSIM show that compared with the traditional NDN,it decreased the number of interest and data packets about 15%and 26%respectively,and reduced the average delay about 14%with ELSA-RC.The experimental results prove that using ELSA-RC can significantly reduce the invalid diffusion and duplicate transmission of interest packets and data packets,and also can reduce the latency of network,so that can improve the performance of NDN.
作者 姜一鸣 雒江涛 Jiang Yiming;Luo Jiangtao(Chongqing Collaborative Innovation Center for Information Communication Technology,Chongqing 400065,China;Electronic Information&Networking Research Institute,Chongqing University of Posts&Telecommunications,Chongqing 400065,China)
出处 《计算机应用研究》 CSCD 北大核心 2018年第10期3048-3052,共5页 Application Research of Computers
基金 重庆市基础科学与前沿研究重点项目(cstc2015jcyj BX0009)
关键词 命名数据网络 拥塞 冗余控制 多路径转发 传输控制 named data networking congestion redundant control multipath forwarding transmission control
  • 相关文献

参考文献4

二级参考文献74

  • 1[1]S Kent, C Lynn, K Seo. Secure Border Gateway Protocol (S-BGP) [J]. IEEE Journal , 2000,18(4):19-58.
  • 2[2]S Kent, C Lynn, K Seo. Design and analysis of the Secure Border Gateway Protocol(S-BGP)[J]. DARPA Information Survivability Conference an Exposition, 1999,(1):110-130.
  • 3[3]K A Bradley, S Cheung, N Duketza, B Mukherjee, R A Olsson. Detecting disruptive routers: a distributed network monitoring approach [J]. Proceeding of the 1998 IEEE Symposium on Security and Privacy,1998,(10):115-124.
  • 4[4]B Vetter, F Wang, SF Wu. An experimental study of insider attacks for OSPF routing protocol[J]. In IEEE International Conference on Network Protocols(ICNP),1997,(10): 293-300.
  • 5[5]B C Soh, T S Dillon. Setting optimal intrusion-detection thresholds[J]. Computers and Security,1995,14(7):621-631 .
  • 6[6]B C Soh, T S Dillion. Intrusion System Processes: A simulation model[J]. Computers and Security, 1997,16(1):71-79 .
  • 7The 2011 digital universe study: extracting value from chaos [EB/OL]. (2011) [2013-01 ]. http ://www. emc.com/collateral/ demos/microsites/emc-digital -universe-2011/index.htm.
  • 8Rhea S, Godfrey B, Karp B, et al. OpenDHT: a public DHT service and its uses[J]. ACM SIGCOMM Computer Com- munication Review, 2005, 35(4): 73-84.
  • 9Eugster P T, Felber P A, Guerraoui R, et al. The many faces of publish/subscribe[J]. ACM Computing Surveys, 2003, 35(2): 114-131.
  • 10Liste M. Content delivery network (CDN) a reference guide [R/OL]. (2001-04-10) [2013 -01 ]. http://whitepapers.informa- tionweek.com/detail/RES/995990181 212.html.

共引文献55

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部