期刊文献+
共找到227篇文章
< 1 2 12 >
每页显示 20 50 100
A reliable and high throughput hybrid routing protocol for vehicular ad-hoc network 被引量:1
1
作者 郭庆 杨明川 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2012年第6期87-92,共6页
Due to highly dynamic topology caused by fast moving nodes the Vehicular ad-hoc network (VANET) results in the existence of transient communication links, which degrade the performance of developed protocols. Establis... Due to highly dynamic topology caused by fast moving nodes the Vehicular ad-hoc network (VANET) results in the existence of transient communication links, which degrade the performance of developed protocols. Established routes frequently become stale, and existing communication flows are interrupted, incurring delay and additional overhead. In this paper we propose a novel hybrid routing protocol, which is the combined between of the table-driven routing and on-demand routing in VANET. It makes fast convergence in routing process, minimal drop links, making more reliable links, and adaptive with changing of VANET topology. With neighbor table is updated instantaneously, and using strong neighbor for routing process makes route discovery process start whenever it received requirement, and through using route mechanism appropriately it reduces significantly route overhead at each node. The simulation results illustrate the outstanding properties of our proposed routing protocol. 展开更多
关键词 移动通信 通信理论 点对多点通信 手机
下载PDF
A FULLY-HYBRID MAC PROTOCOL IN LANS
2
作者 陈家训 朱国进 《Journal of China Textile University(English Edition)》 EI CAS 1993年第1期16-24,共9页
In announced hybrid protocols,there are two mechanisms usually employed.One operates in aCSMA family manner and the other follows a token passing family way.However,only one ofthem works efficiently when traffic is li... In announced hybrid protocols,there are two mechanisms usually employed.One operates in aCSMA family manner and the other follows a token passing family way.However,only one ofthem works efficiently when traffic is light or heavy.This results in an inefficient redundance and aburden to the protocol implementation.In this paper,we present a new hybrid concept and its idealmodel in which risky transmissions alternate with safe transmissions in response to the dynamicchange in traffic.Being similar to virtual time CSMA in the abstract,a single control mechanism isproposed to approach this ideal model.The mechanism is rather compact,and its implementationcan be designed to be simple,efficient,reliable,robust,and fully distributed without any centralizedelement at any instant.Simulation results show that the proposed mechanism performs well overthe entire range of the traffic load from light to heavy. 展开更多
关键词 hybrid LOCAL area NETWORKS protocol MEDIUM ACCESS control
下载PDF
A Hybrid Formal Description Method Based on FSM,CSP and ADT for Communication Protocol
3
作者 Li Layman(Wuhan Transportation Universityl 430063, P. R. China) 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 1998年第3期29-38,共10页
Since communication protocol deals with complex issues related to distribution such as communication, concurrency and synchronization, their development needs to be traced by using sophisticated formal description met... Since communication protocol deals with complex issues related to distribution such as communication, concurrency and synchronization, their development needs to be traced by using sophisticated formal description methods. This paper presents a new hybrid formal method for communication protocol specification. In this method, finite state machine (FSM), communication sequential process (CSP) and abstract data type (ADT) are mixed and the best features of these approaches are offered. In this paper, the main formal description techniques (FDT) for protocol engineering are brieny introduced and a hybrid formal description method based on the FSM, CSP and ADT for communication protocol is described. Finally, this paper presents the formal specification of an example protocol for LAN by using the proposed hybrid formal method. The results of studies show that the hybrid formal description method for communication protocol is an available and effective approach. 展开更多
关键词 Communication protocol Formal description techniques protocol engineering hybrid formal method
下载PDF
Hierarchical hybrid control network design based on LON and master-slave RS-422/485 protocol
4
作者 彭可 陈际达 陈岚 《Journal of Central South University of Technology》 2002年第3期202-207,共6页
Aiming at the weaknesses of LON bus, combining the coexistence of fieldbus and DCS (Distribu ted Control Systems) in control networks, the authors introduce a hierarchical hybrid control network design based on LON an... Aiming at the weaknesses of LON bus, combining the coexistence of fieldbus and DCS (Distribu ted Control Systems) in control networks, the authors introduce a hierarchical hybrid control network design based on LON and master slave RS 422/485 protocol. This design adopts LON as the trunk, master slave RS 422/485 control networks are connected to LON as special subnets by dedicated gateways. It is an implementation method for isomerous control network integration. Data management is ranked according to real time requirements for different network data. The core components, such as control network nodes, router and gateway, are detailed in the paper. The design utilizes both communication advantage of LonWorks technology and the more powerful control ability of universal MCUs or PLCs, thus it greatly increases system response speed and performance cost ratio. 展开更多
关键词 LON fieldbus MASTER-SLAVE RS-422/485 protocol HIERARCHICAL hybrid control NETWORKS router gateway NETWORKS integration
下载PDF
DECLARATIVE HYBRID ROUTING PROTOCOLS IN AD HOC NETWORKS
5
作者 Gao Xiang Li Zhongyuan Wang Min 《Journal of Electronics(China)》 2013年第4期341-351,共11页
This paper presents adaptive hybrid protocols based on the declarative network and mainly discusses the principle and realization of the Bayesian-estimation based adaptive hybrid protocol in the declarative network, w... This paper presents adaptive hybrid protocols based on the declarative network and mainly discusses the principle and realization of the Bayesian-estimation based adaptive hybrid protocol in the declarative network, which is well adapted to the Mobile Ad hoc NETwork (MANET). The adaptive hybrid protocol is designed for ad hoc networks which have characteristics like self-organizing, no trusted party, flexibility, etc. The nodes that run the hybrid protocol can automatically select one routing protocol that is suitable for different network environment. The Bayesian-estimation based adaptive strategy, that improves the adaptability and stability of the protocol, succeeds in the Rapidnet, a declarative network engine. The result in the Rapidnet proves that the hybrid protocol and the adaptive strategy are feasible. The experiment on the ns-3 simulator, an emerging discrete-event network simulator, validates that this protocol performs well and reduces communication overheads. 展开更多
关键词 网络环境 路由协议 移动AD hybrid 自适应策略 混合协议 贝叶斯估计 网络模拟器
下载PDF
Hybrid IGBT在3.3 kW RAC图腾柱无桥PFC的应用
6
作者 伍堂顺 王刚 《家电科技》 2023年第S01期380-384,共5页
为了解决3 HP家用空调PFC功率级IGBT和整流桥温升高以及散热器尺寸大的痛点,采用图腾柱无桥PFC,以混合IGBT IKZA50N65RH5作为高频桥臂开关管,建立了CCM模式平均电流控制的图腾柱无桥PFC的PLECS仿真模型,并在3.3 kW、IGBT开关频率65 kHz... 为了解决3 HP家用空调PFC功率级IGBT和整流桥温升高以及散热器尺寸大的痛点,采用图腾柱无桥PFC,以混合IGBT IKZA50N65RH5作为高频桥臂开关管,建立了CCM模式平均电流控制的图腾柱无桥PFC的PLECS仿真模型,并在3.3 kW、IGBT开关频率65 kHz的图腾柱无桥PFC评估板上实际测试获得了最高97.924%的效率,有效降低了IGBT的温升,提高了整机可靠性。 展开更多
关键词 3 hp家用空调 图腾柱无桥PFC 混合IGBT
下载PDF
OWC/RF混合通信系统研究进展
7
作者 柯程虎 陈明惠 +4 位作者 梁静远 赵黎 王惠琴 王怡 柯熙政 《应用光学》 CAS 北大核心 2024年第2期237-248,共12页
无线光/射频混合通信系统克服了单一通信系统的局限性,在最大发挥无线光通信优势的同时弥补了射频通信的不足,显著提高了链路的可用性和可靠性,为未来高速大容量的信息传输提供了独特的解决方案。对近年来无线光/射频混合通信系统的研... 无线光/射频混合通信系统克服了单一通信系统的局限性,在最大发挥无线光通信优势的同时弥补了射频通信的不足,显著提高了链路的可用性和可靠性,为未来高速大容量的信息传输提供了独特的解决方案。对近年来无线光/射频混合通信系统的研究进展进行了综述,首先介绍了不同混合通信系统模型的工作原理与应用,然后讨论了混合通信系统所面临的挑战和解决方法,最后展望了无线光/射频混合通信系统的未来发展趋势,旨在为无线光/射频混合通信系统的进一步研究和发展奠定基础。 展开更多
关键词 无线光/射频混合通信 大气湍流 切换机制 中继协议
下载PDF
适用于水声传感器网络的混合路由协议
8
作者 郭卫振 朱敏 杨波 《网络新媒体技术》 2024年第3期57-63,72,共8页
针对水声传感器网络中静态节点与移动节点不同路由设计需求,分析确定性路由和机会路由的特点,提出一种适用于水声传感器网络的混合路由协议(HRP-USN),将水声传感器网络区分为静态节点和移动节点开展设计。静态节点路由协议融合静态路由... 针对水声传感器网络中静态节点与移动节点不同路由设计需求,分析确定性路由和机会路由的特点,提出一种适用于水声传感器网络的混合路由协议(HRP-USN),将水声传感器网络区分为静态节点和移动节点开展设计。静态节点路由协议融合静态路由和动态路由优点,路由建立过程手动配置路由表,路由维护和重建过程采用联合MAC层反馈及聚焦转发控制的方式,兼顾自组织性和协议复杂性;移动节点采用机会路由,将数据以单跳方式发送到静态节点,自适应确定最优中继节点后按照已有路由传输到网关节点,利用水声信道广播特性,提升网络弱通信条件下数据包投递率。通过仿真分析,在不同节点移动速度和误码率条件下,HRP-USN数据包投递率明显优于其他传统路由协议,更加适合水声传感器网络。 展开更多
关键词 水声传感器网络 混合路由协议 静态节点 移动节点 确定性路由 机会路由
下载PDF
基于射频链选择和混合预编码设计的双功能雷达通信能效最大化研究
9
作者 刘嘉宁 赵千禧 +1 位作者 王帝文 田峰 《移动通信》 2024年第6期27-33,共7页
针对毫米波大规模多天线双功能雷达通信系统能量效率低、硬件成本过高等问题,建立双功能雷达通信新模型,提出并求解系统能效最大化问题。首先,考虑硬件损耗干扰和多用户干扰等因素,提出新的通信模型与雷达模型。其次,构建具有感知约束... 针对毫米波大规模多天线双功能雷达通信系统能量效率低、硬件成本过高等问题,建立双功能雷达通信新模型,提出并求解系统能效最大化问题。首先,考虑硬件损耗干扰和多用户干扰等因素,提出新的通信模型与雷达模型。其次,构建具有感知约束和功率约束的能效最大化问题,并将该非凸问题分解为两个子问题。最后,利用基于近似优化方法的分数规划和加权正交匹配追踪算法,分别实现射频链选择子问题和混合预编码设计子问题的优化求解。仿真结果表明,所提机制方案不仅实现了系统能效最大化,同时实现了通信性能与感知性能之间的折中优化。 展开更多
关键词 双功能雷达通信 能量效率 射频链 混合预编码
下载PDF
SER analysis and power allocation for hybrid cooperative transmission system 被引量:2
10
作者 Guoyan Li Youguang Zhang Wang Kang 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2012年第5期661-670,共10页
The symbol-error-rate(SER) and power allocation for hybrid cooperative(HC) transmission system are investigated.Closed-form SER expression is derived by using the moment generating function(MGF)-based approach.H... The symbol-error-rate(SER) and power allocation for hybrid cooperative(HC) transmission system are investigated.Closed-form SER expression is derived by using the moment generating function(MGF)-based approach.However,the resultant SER contains an MGF of the harmonic mean of two independent random variables(RVs),which is not tractable in SER analysis.We present a simple MGF expression of the harmonic mean of two independent RVs which avoids the hypergeometric functions used commonly in previous studies.Using the simple MGF,closed-form SER for HC system with M-ary phase shift keying(M-PSK) signals is provided.Further,an approximation as well as an upper bound of the SER is presented.It is shown that the SER approximation is asymptotically tight.Based on the tight SER approximation,the power allocation of the HC system is investigated.It is shown that the optimal power allocation does not depend on the fading parameters of the source-destination(SD) channel and it only depends on the source-relay(SR) and relay-destination(RD) channels.Moreover,the performance gain of the power allocation depends on the ratio of the channel quality between RD and SR.With the increase of this ratio,more performance gain can be acquired. 展开更多
关键词 cooperative transmission relaying protocols hybrid cooperation symbol-error-rate(SER) power allocation
下载PDF
Research on a Secure Communication Protocol Based on National Secret SM2 Algorithm 被引量:1
11
作者 Youhai Shao Yong Wang +1 位作者 Yun Yang Xiang Wang 《Journal of Computer and Communications》 2022年第1期42-56,共15页
Most of the public key algorithms used in the exchange of information for power data transmission protocols are RSA. The core of the key part of this kind of algorithm system has not been announced. For the domestic s... Most of the public key algorithms used in the exchange of information for power data transmission protocols are RSA. The core of the key part of this kind of algorithm system has not been announced. For the domestic sensitive information data field, there are threats such as preset backdoors and security vulnerabilities. In response to the above problems, the article introduces a secure communication protocol based on the optimized Secret SM2 algorithm, which uses socket programming to achieve two-way encrypted communication between clients and services, and is able to complete the security protection of data encryption transmission, authentication, data tampering, etc., and proves through experiments that the security protocol is more secure than traditional methods, can effectively identify each other, carry out stable and controllable data encryption transmission, and has good applicability. 展开更多
关键词 Secret Algorithm SM2 Communication protocol hybrid Encryption Security Protection
下载PDF
基于MDRTDB并发控制协议DHP-2PL的研究
12
作者 于志强 贾智平 《计算机工程与应用》 CSCD 北大核心 2007年第4期186-189,共4页
并发控制协议是确保数据库性能目标的一个关键问题,对移动分布式实时数据库(Mobile Distributed Real-time DataBase,简称MDRTDB)并发控制协议-分布式高优先级两段锁协议(Distributed High Priority two Phrase Locking protocol,简称DH... 并发控制协议是确保数据库性能目标的一个关键问题,对移动分布式实时数据库(Mobile Distributed Real-time DataBase,简称MDRTDB)并发控制协议-分布式高优先级两段锁协议(Distributed High Priority two Phrase Locking protocol,简称DHP-2PL)从两个方面做出了改进:一是采用动态优先级分配策略,能够缩短实时事务执行的等待时间和避免饥饿现象的产生;二是为了增加并发度在加锁机制中使用混合加锁粒度,同时能够减少加锁开销。最后通过模拟应用环境的性能测试表明,这两方面的改进更好地满足了事务截止期的要求,提高了移动实时事务的成功率。 展开更多
关键词 移动分布式实时数据库 并发控制 两段锁协议 动态优先级 混合加锁粒度
下载PDF
A CSMA/CA based MAC protocol for hybrid Power-line/Visible-light communication networks:Design and analysis
13
作者 Sheng Hao Huyin Zhang +2 位作者 Fei Yang Chenghao Li Jing Wang 《Digital Communications and Networks》 SCIE 2024年第2期481-497,共17页
Hybrid Power-line/Visible-light Communication(HPVC)network has been one of the most promising Cooperative Communication(CC)technologies for constructing Smart Home due to its superior communication reliability and har... Hybrid Power-line/Visible-light Communication(HPVC)network has been one of the most promising Cooperative Communication(CC)technologies for constructing Smart Home due to its superior communication reliability and hardware efficiency.Current research on HPVC networks focuses on the performance analysis and optimization of the Physical(PHY)layer,where the Power Line Communication(PLC)component only serves as the backbone to provide power to light Emitting Diode(LED)devices.So designing a Media Access Control(MAC)protocol remains a great challenge because it allows both PLC and Visible Light Communication(VLC)components to operate data transmission,i.e.,to achieve a true HPVC network CC.To solve this problem,we propose a new HPC network MAC protocol(HPVC MAC)based on Carrier Sense Multiple Access/Collision Avoidance(CSMA/CA)by combining IEEE 802.15.7 and IEEE 1901 standards.Firstly,we add an Additional Assistance(AA)layer to provide the channel selection strategies for sensor stations,so that they can complete data transmission on the selected channel via the specified CSMA/CA mechanism,respectively.Based on this,we give a detailed working principle of the HPVC MAC,followed by the construction of a joint analytical model for mathematicalmathematical validation of the HPVC MAC.In the modeling process,the impacts of PHY layer settings(including channel fading types and additive noise feature),CSMA/CA mechanisms of 802.15.7 and 1901,and practical configurations(such as traffic rate,transit buffer size)are comprehensively taken into consideration.Moreover,we prove the proposed analytical model has the solvability.Finally,through extensive simulations,we characterize the HPVC MAC performance under different system parameters and verify the correctness of the corresponding analytical model with an average error rate of 4.62%between the simulation and analytical results. 展开更多
关键词 hybrid power-line/Visible light communication (hpVC)networks MAC protocol CSMA/CA IEEE 802.15.7 IEEE 1901 Performance analysis
下载PDF
Practical Routing Protocol Models to Improve Network Performance and Adequacy
14
作者 Mohammad Alhihi 《Journal of Computer and Communications》 2017年第6期114-124,共11页
The telecommunications network has become an essential facility of our daily life, which is the reason why a good number of the recent researches are directed to it. In this paper, the performance of routing protocols... The telecommunications network has become an essential facility of our daily life, which is the reason why a good number of the recent researches are directed to it. In this paper, the performance of routing protocols for selected network and the optimum way of utilizing the network resources is proposed, through improving the routing method protocols to obtain the most accurate communication models, which give the best network performance, taking into consideration that the protocol time interval to recalculate the future routing step is agreed to be our performance criteria, which is then used to determine the total amount of incoming traffic normalized at the best network performance with respect to the network capacity as well. Moreover, adaptive routing evaluation methods have been mathematically investigated in this work for telecommunication networks (TN), more precisely, developing the infrared radiation (IR) routing methods for hybrid TN applications, in terms of implementation conditions at a certain guaranteed quality of service, where we give a particular interest in analyzing routing methods based on the fact that the distribution information is contained in the routing variables, rather than in the state variables. The protocol that deals with the unbalanced traffic distribution over TN nodes has been investigated in this paper as well, and simulation results show good progress in the proposed protocol over the traditional protocols. 展开更多
关键词 Telecommunications NETWORK ROUTING protocols hybrid NETWORK
下载PDF
Performance analysis of QoS routing protocol for WiMedia networks
15
作者 JUNG Jin-uk JIN Kyo-hong +1 位作者 HWANG Min-tae JEON Young-ae 《Journal of Central South University》 SCIE EI CAS 2012年第12期3468-3474,共7页
Though the WiMedia supports higher data rates than other WPAN technologies,a WiMedia device cannot reach other devices that are separated from it by more than 10 m,which is the typical limited transmission range of th... Though the WiMedia supports higher data rates than other WPAN technologies,a WiMedia device cannot reach other devices that are separated from it by more than 10 m,which is the typical limited transmission range of the WiMedia protocol.In this work,we propose a multi-hop QoS routing protocol to enable WiMedia devices to transmit real-time data to devices that are located out of the transmission range.The proposed routing protocol is a hybrid algorithm,which mixes the table-driven and on-demand routing algorithms,searching one or more routes according to the number of hops to a destination device.WiMedia MAC is potentially capable of learning the existence of neighbor devices by using a beacon frame.By utilizing the neighbors' information,all devices can create routing entries for devices within 2-hops periodically.For devices beyond the 2-hop range,the newly designed on-demand routing algorithm is applied to multi-hop routing.If a routing entry for a destination device is not listed in the routing table,the source device sends a request packet to 2-hop range devices which could be found in the routing table.Since every device maintains routing entries for 2-hop range devices in the routing table,the request packet is replied in advance before its arrival at the destination device.Also,to decide the optimal route for a destination device,the number of medium access slots(MASs),received signal strength indicator(RSSI)and hop count are utilized to establish a QoS-enabled routing table.We perform ns-2 simulation to investigate the performance of the proposed routing protocol with AODV and DSDV.The simulation results show that the proposed protocol has better throughput and lower overhead than other protocols. 展开更多
关键词 路由协议 性能分析 QoS 实时数据传输 目标设备 网络 混合算法 路由算法
下载PDF
AES RSA-SM2 Algorithm against Man-in-the-Middle Attack in IEC 60870-5-104 Protocol
16
作者 Shan Shi Yong Wang +1 位作者 Cunming Zou Yingjie Tian 《Journal of Computer and Communications》 2022年第1期27-41,共15页
The IEC60870-5-104 protocol lacks an integrated authentication mechanism during plaintext transmission, and is vulnerable to security threats, monitoring, tampering, or cutting off communication connections. In order ... The IEC60870-5-104 protocol lacks an integrated authentication mechanism during plaintext transmission, and is vulnerable to security threats, monitoring, tampering, or cutting off communication connections. In order to verify the security problems of 104 protocol, the 104 master-slave communication implemented DoS attacks, ARP spoofing and Ettercap packet filtering and other man-in-the-middle attacks. DoS attacks may damage the network functions of the 104 communication host, resulting in communication interruption. ARP spoofing damaged the data privacy of the 104 protocol, and Ettercap packet filtering cut off the communication connection between the master and the slave. In order to resist the man-in-the-middle attack, the AES and RSA hybrid encryption signature algorithm and the national secret SM2 elliptic curve algorithm are proposed. AES and RSA hybrid encryption increases the security strength of communication data and realizes identity authentication. The digital signature implemented by the SM2 algorithm can realize identity verification, ensure that the data has not been tampered with, and can ensure the integrity of the data. Both of them improve the communication security of the 104 protocol. 展开更多
关键词 104 protocol Man in the Middle Attack AES and RSA hybrid Encryption Signature National Secret SM2 Algorithm
下载PDF
交直流混联电网信息多协议安全认证集成技术研究 被引量:1
17
作者 吕华辉 杨航 +2 位作者 林志达 李慧娟 张华兵 《电网与清洁能源》 CSCD 北大核心 2023年第1期64-69,共6页
单一通信协议无法满足在复杂环境下网络认证的需求。提出面向交直流混联电网的多协议安全认证集成技术。为满足用户的前向安全性判定,以通用多信任域协议建立会话双方的密钥协议,更新算法的同时更新密钥,使得在不同信任域中,会话内容不... 单一通信协议无法满足在复杂环境下网络认证的需求。提出面向交直流混联电网的多协议安全认证集成技术。为满足用户的前向安全性判定,以通用多信任域协议建立会话双方的密钥协议,更新算法的同时更新密钥,使得在不同信任域中,会话内容不被泄露;利用钥匙分发中心管理机制和公开密钥加密协议,分别对会话双方展开数字签名的验证,通过双向身份验证即可同意会话请求。仿真实验结果表明:会话发起后在出现噪声干扰的多个时刻下,所提方法均停止通信,避免了信息丢失;当噪声干扰出现次数由0增加到350次时,所提方法的正确终止通信准确率始终保持在90%以上。 展开更多
关键词 交直流混联电网 信息多协议 安全认证 密钥 数字签名
下载PDF
A framework of hybrid authentication for link access under MIH environments
18
作者 Kangsuk Chae Jiman Mun Souhwan Jung 《Journal of Measurement Science and Instrumentation》 CAS 2012年第4期362-369,共8页
A unified hybrid authentication framework was proposed to provide proactive authentication and re-authentication for media independent handover(MIH)-based multi-wireless access.In addition,a specific protocol distribu... A unified hybrid authentication framework was proposed to provide proactive authentication and re-authentication for media independent handover(MIH)-based multi-wireless access.In addition,a specific protocol distributing a hierarchical key after the proactive authentication from key holder to base station has been proposed.The proposed hybrid authentication framework not only performs proactive authentication with credentials based on Chameleon hashing,which removes the authentication procedures that exchanges messages with a authentication server,but also performs re-authentication with EAP re-authentication protocol(ERP)that distributes the hierarchical key on the basis of the root key generated by the proactive authentication. 展开更多
关键词 自动化系统 数据处理 数据收集 自动分类
下载PDF
基于生物学科核心素养的HPS教学模式探索——以“孟德尔豌豆杂交实验”为例
19
作者 安凌燕 《现代盐化工》 2022年第4期132-133,142,共3页
科学史、科学哲学和科学社会学(HPS)相结合的教学模式是培养学生生物学科核心素养的良好工具。结合孟德尔豌豆杂交实验以及孟德尔个人的经历,利用HPS教学模式可以有效培养学生的理性思维,增强学生的社会责任感,提高学生的科学探究能力。
关键词 hpS教学模式 生物学科核心素养 豌豆杂交实验 孟德尔
下载PDF
一种可动态配置的分布式内存池缓存一致性机制 被引量:1
20
作者 段卓辉 刘海坤 +3 位作者 赵金玮 刘一航 廖小飞 金海 《计算机研究与发展》 EI CSCD 北大核心 2023年第9期1960-1972,共13页
在分布式内存系统中,缓存是减少远端内存访问开销的一种有效手段.然而,单一的缓存一致性保证机制往往不能高效适配不同类型负载的访存特性.为此,面向分布式异构内存池系统,设计了基于目录和基于广播相结合的混合缓存一致性保证机制.利... 在分布式内存系统中,缓存是减少远端内存访问开销的一种有效手段.然而,单一的缓存一致性保证机制往往不能高效适配不同类型负载的访存特性.为此,面向分布式异构内存池系统,设计了基于目录和基于广播相结合的混合缓存一致性保证机制.利用四象限矩阵分析方法,对每个数据对象进行访存模式的判定分析,并为其配置最高效的缓存一致性保证策略,并且可以根据对象访存特征的变化在2种策略之间动态切换.实验结果表明,相比使用单一的缓存一致性保证机制,采用可动态配置的混合缓存一致性保证机制可提升分布式异构内存池系统的读和写,性能平均达32.31%和31.20%.此外,混合的缓存一致性保证机制在客户端数量不断增加时仍然表现出良好的可扩展性. 展开更多
关键词 分布式异构内存池 分布式缓存机制 分布式一致性协议 基于目录的缓存一致性 基于广播的缓存一致性
下载PDF
上一页 1 2 12 下一页 到第
使用帮助 返回顶部