期刊文献+

基于通告转移机制的CCN网络缓存替换策略 被引量:2

CCN CACHE REPLACEMENT STRATEGY BASED ON NOTIFICATION TRANSFER MECHANISM
下载PDF
导出
摘要 针对内容中心网络(Content-centric Network,CCN)中现有的缓存替换策略考虑问题单一,直接删除替换内容的不足,提出一种基于通告转移机制(Notification Transfer Mechanism,NTM)的CCN网络缓存替换策略。结合动态内容流行度、缓存代价以及时间因子求取内容缓存价值(Content Storage Value,CSV)。依据CSV值判定缓存替换内容,同时建立请求-响应的活动路径,替换内容沿活动路径存储在适合的节点,便于域内网络用户再次请求。仿真实验表明,相对于已有的几种缓存替换算法,该算法能够有效地提高CCN网络平均缓存命中率,降低路由平均请求跳数。 In view of the single consideration of the existing cache replacement strategy in content-centric network(CCN)and the defect of directly deleting the replacement content,this paper proposes a CCN cache replacement strategy based on notification transfer mechanism(NTM).It combined dynamic content popularity,cache cost,and time factor to get the content cache value(CSV).The cache replacement was determined based on the CSV value,and the active path of request-response was established,The replacement content was stored along the active path at the appropriate node,so that the intra-domain network user could request it again.Simulation experiments show that compared with several existing cache replacement algorithms,our algorithm can effectively improve the average cache hit rate of the CCN and reduce the average number of request hops for routing.
作者 王波 胡军台 肖承仟 吕杰 孙世勇 杜春锋 Wang Bo;Hu Juntai;Xiao Chengqian;Lv Jie;Sun Shiyong;Du Chunfeng(Pingdingshan Power Supply Company,State Grid Henan Power Company,Pingdingshan 467000,Henan,China;School of Computer Science and Communication Engineering,Zhengzhou University of Light Industry,Zhengzhou 450002,Henan,China)
出处 《计算机应用与软件》 北大核心 2020年第6期148-153,共6页 Computer Applications and Software
基金 国家自然科学基金项目(61672471)。
关键词 CCN网络 通告转移 动态内容流行度 缓存代价 活动路径 Content-centric network(CCN) Notification transfer Dynamic content popularity Cache cost Activity path
  • 相关文献

参考文献7

二级参考文献110

  • 1林闯,任丰原.可控可信可扩展的新一代互联网[J].软件学报,2004,15(12):1815-1821. 被引量:79
  • 2蔡青松,李子木,胡建平.Internet上的流媒体特性及用户访问行为研究[J].北京航空航天大学学报,2005,31(1):25-30. 被引量:13
  • 3林闯,彭雪海.可信网络研究[J].计算机学报,2005,28(5):751-758. 被引量:253
  • 4林闯,汪洋,李泉林.网络安全的随机模型方法与评价技术[J].计算机学报,2005,28(12):1943-1956. 被引量:92
  • 5林闯,雷蕾.下一代互联网体系结构研究[J].计算机学报,2007,30(5):693-711. 被引量:64
  • 6Cisco visual networking index: Forecast and methodology: 2012-2017. 2013. http://www.cisco.com/en/US/solutions/collateral/ ns341/ns525/ns537/ns705/ns827/whiteAaaper_el 1-481360 ns827_Networking_Soludons_White Paper.html.
  • 7Borst S, Gupta V, Walid A. Distributed caching algorithms for content distribution networks. In: Proc. of the IEEE INFOCOM. 2010. 1-9. [doi: 10.1109/INFCOM.2010.5461964].
  • 8Cheriton DR, Gritter M. TRIAD: A new next-generation lnternet architecture. Technical Report, Stanford: Computer Science Department, Stanford University, 2000. http://www-dsg.stanford.edu/triad/triad.ps.gz.
  • 9Koponen T, Chawla M, Chun BG, Ermolinskiy A, Kim KH, Shenker S, Stoica I. A data-oriented (and beyond) network architecture. In: Proc. of the ACM SIGCOMM. 2007. 181-192. [doi: 10.1145/1282380.1282402].
  • 10Jacobson V, Smetters DK, Thornton JD, Plass MF, Briggs NH, Braynard RL. Networking named content. In: Proc. of the 5th Int'l Conf. on Emerging Networking Experiments and Technologies (CoNEXT 2009). New York: ACM, 2009. 1-12.

共引文献214

同被引文献29

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部