期刊文献+
共找到1,000篇文章
< 1 2 50 >
每页显示 20 50 100
Grid architecture model of network centric warfare 被引量:1
1
作者 Yan Tihua Wang Baoshu 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2006年第1期121-125,共5页
NCW(network centric warfare) is an information warfare concentrating on network. A global network-centric warfare architecture with OGSA grid technology is put forward,which is a four levels system including the user ... NCW(network centric warfare) is an information warfare concentrating on network. A global network-centric warfare architecture with OGSA grid technology is put forward,which is a four levels system including the user level, the application level, the grid middleware layer and the resource level. In grid middleware layer,based on virtual hosting environment, a BEPL4WS grid service composition method is introduced. In addition, the NCW grid service model is built with the help of Eclipse-SDK-3.0.1 and Bpws4j. 展开更多
关键词 network centric warfare OGSA grid service composition BPEL4WS.
下载PDF
Study on QOS Routing in Network Centric Warfare
2
作者 梁永生 张乃通 《Chinese Journal of Aeronautics》 SCIE EI CAS CSCD 2005年第3期250-255,共6页
The concept of network centric warfare (NCW) and the distributed equal-node network architecture in NCW are introduced in this paper. The data flow requirement model in NCW is presented. Based on synthetic analysis ... The concept of network centric warfare (NCW) and the distributed equal-node network architecture in NCW are introduced in this paper. The data flow requirement model in NCW is presented. Based on synthetic analysis of network resource, the QOS (Quality of Service) parameters and their characters, the high requirement of real-time synchronization in NCW, the single QOS routing constraint, and the network latency between the detector and weapon control station, are presented. To take an example for 3-node brigade (regiment) level NCW demonstration platform, the algorithm of end-to-end network latency and path information in NCW are presented. The algorithm program based on Server/Client architecture is developed. The optimal path is the link whose latency between the detector and weapon control station is the smallest. This paper solves the key issue and satisfies the needs on network latency in NCW. The study results can be widely applied in the decision of the optimal path which is based on multiple service provision points. 展开更多
关键词 network centric warfare (NCW) quality of service (QOS) ROUTING network latency latency algorithm optimal path
下载PDF
Identify information sources with different start times in complex networks based on sparse observers
3
作者 Yuan-Zhang Deng Zhao-Long Hu +3 位作者 Feilong Lin Chang-Bing Tang Hui Wang Yi-Zhen Huang 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第11期467-479,共13页
The dissemination of information across various locations is an ubiquitous occurrence,however,prevalent methodologies for multi-source identification frequently overlook the fact that sources may initiate disseminatio... The dissemination of information across various locations is an ubiquitous occurrence,however,prevalent methodologies for multi-source identification frequently overlook the fact that sources may initiate dissemination at distinct initial moments.Although there are many research results of multi-source identification,the challenge of locating sources with varying initiation times using a limited subset of observational nodes remains unresolved.In this study,we provide the backward spread tree theorem and source centrality theorem,and develop a backward spread centrality algorithm to identify all the information sources that trigger the spread at different start times.The proposed algorithm does not require prior knowledge of the number of sources,however,it can estimate both the initial spread moment and the spread duration.The core concept of this algorithm involves inferring suspected sources through source centrality theorem and locating the source from the suspected sources with linear programming.Extensive experiments from synthetic and real network simulation corroborate the superiority of our method in terms of both efficacy and efficiency.Furthermore,we find that our method maintains robustness irrespective of the number of sources and the average degree of network.Compared with classical and state-of-the art source identification methods,our method generally improves the AUROC value by 0.1 to 0.2. 展开更多
关键词 complex networks information spread source identification backward spread centricity
下载PDF
Caching Strategies in NDN Based Wireless Ad Hoc Network:A Survey
4
作者 Ahmed Khalid Rana Asif Rehman Byung-Seo Kim 《Computers, Materials & Continua》 SCIE EI 2024年第7期61-103,共43页
Wireless Ad Hoc Networks consist of devices that are wirelessly connected.Mobile Ad Hoc Networks(MANETs),Internet of Things(IoT),and Vehicular Ad Hoc Networks(VANETs)are the main domains of wireless ad hoc network.Int... Wireless Ad Hoc Networks consist of devices that are wirelessly connected.Mobile Ad Hoc Networks(MANETs),Internet of Things(IoT),and Vehicular Ad Hoc Networks(VANETs)are the main domains of wireless ad hoc network.Internet is used in wireless ad hoc network.Internet is based on Transmission Control Protocol(TCP)/Internet Protocol(IP)network where clients and servers interact with each other with the help of IP in a pre-defined environment.Internet fetches data from a fixed location.Data redundancy,mobility,and location dependency are the main issues of the IP network paradigm.All these factors result in poor performance of wireless ad hoc networks.The main disadvantage of IP is that,it does not provide in-network caching.Therefore,there is a need to move towards a new network that overcomes these limitations.Named Data Network(NDN)is a network that overcomes these limitations.NDN is a project of Information-centric Network(ICN).NDN provides in-network caching which helps in fast response to user queries.Implementing NDN in wireless ad hoc network provides many benefits such as caching,mobility,scalability,security,and privacy.By considering the certainty,in this survey paper,we present a comprehensive survey on Caching Strategies in NDN-based Wireless AdHocNetwork.Various cachingmechanism-based results are also described.In the last,we also shed light on the challenges and future directions of this promising field to provide a clear understanding of what caching-related problems exist in NDN-based wireless ad hoc networks. 展开更多
关键词 Content centric network Internet of Things mobile ad hoc network named data network vehicular ad hoc network
下载PDF
Tensor-Centric Warfare VI: A Global Warfare Model
5
作者 Vladimir Ivancevic Darryn Reid +1 位作者 Peyam Pourbeik Michael Pilling 《Intelligent Control and Automation》 2019年第1期46-61,共16页
We propose a global warfare model that integrates the models of the whole tensor-centric warfare series, represented as a high-dimensional entangled warfare category. Its underpinning metaphysics is “entangled fusion... We propose a global warfare model that integrates the models of the whole tensor-centric warfare series, represented as a high-dimensional entangled warfare category. Its underpinning metaphysics is “entangled fusion”: this is the macroscopic entanglement concept inspired by high-dimensional (HD) quantum computation (the “quantum brain”), in which any number of entangled wave-functions can be highly correlated, with neuron-like signaling among them. From this entangled perspective, war and battle is seen essentially as a holistic phenomenon: if any one of a set of mutually entangled warring parties is removed from the equation, then the war as it is instantly stops, possibly to be replaced by a new conflict between the remaining parties but distinct from that which it supplants. The formal global warfare framework developed in this paper expresses this fundamental idea of arbitrary many interrelated/entangled conflicts, each of them defined by its own battle-manifold (with warfighting tensor fields acting on it) and occurring (more-or-less) simultaneously on the planet;we call this entangled 展开更多
关键词 Tensor-centric warfare GLOBAL warfare Model ENTANGLED warfare CATEGORY
下载PDF
Tensor-Centric Warfare II: Entropic Uncertainty Modeling
6
作者 Vladimir Ivancevic Darryn Reid Peyam Pourbeik 《Intelligent Control and Automation》 2018年第2期30-51,共22页
In the first paper of the tensor-centric warfare (TCW) series [1], we proposed a tensor model of combat generalizing earlier Lanchester-type systems with a particular emphasis on contemporary military thinking, includ... In the first paper of the tensor-centric warfare (TCW) series [1], we proposed a tensor model of combat generalizing earlier Lanchester-type systems with a particular emphasis on contemporary military thinking, including the distributed C4ISR system (Command, Control, Communications, Computing, Intelligence, Surveillance and Reconnaissance). In the present paper, we extend this initial tensor combat model with entropic Lie-derivative machinery in order to capture some aspects of this deep uncertainty, while, in the process, formalizing into our model military notion of symmetry and asymmetry in warfare as a commutator, also known as a Lie bracket. In doing so, we have sought to shift the question from the prediction of outcomes of combat, upon which previous combat models such as the Lanchester-type equations have been typically constructed, towards determining the uncertainty outcomes, using a rigorous analytical basis. 展开更多
关键词 Tensor-centric warfare NON-EQUILIBRIUM Entropy Uncertainty and SYMMETRY of warfare Lie-Derivative MACHINERY
下载PDF
Tensor-Centric Warfare III: Combat Dynamics with Delta-Strikes
7
作者 Vladimir Ivancevic Peyam Pourbeik Darryn Reid 《Intelligent Control and Automation》 2018年第4期107-122,共16页
This paper is the third part of the complex combat dynamics series, called tensor-centric warfare (for the first two parts, see [1] [2]). In the present paper, we extend the tensor combat model from [1] and [2] to mod... This paper is the third part of the complex combat dynamics series, called tensor-centric warfare (for the first two parts, see [1] [2]). In the present paper, we extend the tensor combat model from [1] and [2] to model the dynamics of delta-strikes/missiles , which are temporally confined strong kinetic effects . The scenarios analyzed here include both deterministic and random delta-strikes which mimic single, multiple and continuous-time missile attacks. We also look at the bidirectional random strike as well as the general Hamilton-Langevin dynamics framework and provide an interpretation of the results obtained through simulation. 展开更多
关键词 Tensor-centric warfare COMBAT DYNAMICS with Delta-Strikes/Missiles
下载PDF
Tensor-Centric Warfare V: Topology of Systems Confrontation
8
作者 Vladimir Ivancevic Peyam Pourbeik Darryn Reid 《Intelligent Control and Automation》 2019年第1期13-45,共33页
In this paper, as a new contribution to the tensor-centric warfare (TCW) series [1] [2] [3] [4], we extend the kinetic TCW-framework to include non-kinetic effects, by addressing a general systems confrontation [5], w... In this paper, as a new contribution to the tensor-centric warfare (TCW) series [1] [2] [3] [4], we extend the kinetic TCW-framework to include non-kinetic effects, by addressing a general systems confrontation [5], which is waged not only in the traditional physical Air-Land-Sea domains, but also simultaneously across multiple non-physical domains, including cyberspace and social networks. Upon this basis, this paper attempts to address a more general analytical scenario using rigorous topological methods to introduce a two-level topological representation of modern armed conflict;in doing so, it extends from the traditional red-blue model of conflict to a red-blue-green model, where green represents various neutral elements as active factions;indeed, green can effectively decide the outcomes from red-blue conflict. System confrontations at various stages of the scenario will be defined by the non-equilibrium phase transitions which are superficially characterized by sudden entropy growth. These will be shown to have the underlying topology changes of the systems-battlespace. The two-level topological analysis of the systems-battlespace is utilized to address the question of topology changes in the combined battlespace. Once an intuitive analysis of the combined battlespace topology is performed, a rigorous topological analysis follows using (co)homological invariants of the combined systems-battlespace manifold. 展开更多
关键词 Tensor-centric warfare SYSTEMS CONFRONTATION Systems-Battlespace TOPOLOGY Cobordisms and MORSE Functions Morse-Smale Homology Morse-Witten Cohomology Hodge-De Rham Theory
下载PDF
Caching Algorithm with a Novel Cost Model to Deliver Content and Its Interest over Content Centric Networks 被引量:1
9
作者 SU Zhou FANG Dongfeng HAN Bo 《China Communications》 SCIE CSCD 2015年第7期23-30,共8页
Recently the content centric networks(CCNs) have been advocated as a new solution to design future networks. In the CCNs, content and its interest are delivered over the content store and pending interest table, respe... Recently the content centric networks(CCNs) have been advocated as a new solution to design future networks. In the CCNs, content and its interest are delivered over the content store and pending interest table, respectively, where both have limited capacities. Therefore, how to design the corresponding algorithms to efficiently deliver content and inertest over them becomes an important issue. In this paper, based on the analysis of content distribution, status of content store, and pending interest, we propose a novel caching algorithm with which the resources of content store and pending interest table can be efficiently used. Simulation results prove that the proposal can outperform the conventional methods. 展开更多
关键词 content centric networks content delivery CACHING future networks
下载PDF
A Survey of Applications Research on Content-Centric Networking 被引量:2
10
作者 Xiuquan Qiao Hongyi Wang +3 位作者 Wei Tan Athanasios V.Vasilakos Junliang Chen MBrian Blake 《China Communications》 SCIE CSCD 2019年第9期122-140,共19页
As a named data-based clean-slate future Internet architecture,Content-Centric Networking(CCN)uses entirely different protocols and communication patterns from the host-to-host IP network.In CCN,communication is wholl... As a named data-based clean-slate future Internet architecture,Content-Centric Networking(CCN)uses entirely different protocols and communication patterns from the host-to-host IP network.In CCN,communication is wholly driven by the data consumer.Consumers must send Interest packets with the content name and not by the host’s network address.Its nature of in-network caching,Interest packets aggregation and hop-byhop communication poses unique challenges to provision of Internet applications,where traditional IP network no long works well.This paper presents a comprehensive survey of state-of-the-art application research activities related to CCN architecture.Our main aims in this survey are(a)to identify the advantages and drawbacks of CCN architectures for application provisioning;(b)to discuss the challenges and opportunities regarding service provisioning in CCN architectures;and(c)to further encourage deeper thinking about design principles for future Internet architectures from the perspective of upper-layer applications. 展开更多
关键词 Content-centric networking(CCN) named-data networkING (NDN) APPLICATIONS information-centric networkING FUTURE Internet
下载PDF
What to Cache:Differentiated Caching Resource Allocation and Management in Information-Centric Networking 被引量:6
11
作者 Ru Huo Renchao Xie +2 位作者 Hengyang Zhang Tao Huang Yunjie Liu 《China Communications》 SCIE CSCD 2016年第12期261-276,共16页
Information-centric networking(ICN) aims to improve the efficiency of content delivery and reduce the redundancy of data transmission by caching contents in network nodes. An important issue is to design caching metho... Information-centric networking(ICN) aims to improve the efficiency of content delivery and reduce the redundancy of data transmission by caching contents in network nodes. An important issue is to design caching methods with better cache hit rate and achieve allocating on-demand. Therefore, an in-network caching scheduling scheme for ICN was designed, distinguishing different kinds of contents and dynamically allocating the cache size on-demand. First discussing what was appropriated to be cached in nodes, and then a classification about the contents could be cached was proposed. Furthermore, we used AHP to weight different contents classes through analyzing users' behavior. And a distributed control process was built, to achieve differentiated caching resource allocation and management. The designed scheme not only avoids the waste of caching resource, but also further enhances the cache availability. Finally, the simulation results are illustrated to show that our method has the superior performance in the aspects of server hit rate and convergence. 展开更多
关键词 caching resource allocation MANAGEMENT differentiation control process information-centric networking
下载PDF
Preliminary Network Centric Therapy for Machine Learning Classification of Deep Brain Stimulation Status for the Treatment of Parkinson’s Disease with a Conformal Wearable and Wireless Inertial Sensor 被引量:11
12
作者 Robert LeMoyne Timothy Mastroianni +1 位作者 Donald Whiting Nestor Tomycz 《Advances in Parkinson's Disease》 2019年第4期75-91,共17页
The concept of Network Centric Therapy represents an amalgamation of wearable and wireless inertial sensor systems and machine learning with access to a Cloud computing environment. The advent of Network Centric Thera... The concept of Network Centric Therapy represents an amalgamation of wearable and wireless inertial sensor systems and machine learning with access to a Cloud computing environment. The advent of Network Centric Therapy is highly relevant to the treatment of Parkinson’s disease through deep brain stimulation. Originally wearable and wireless systems for quantifying Parkinson’s disease involved the use a smartphone to quantify hand tremor. Although originally novel, the smartphone has notable issues as a wearable application for quantifying movement disorder tremor. The smartphone has evolved in a pathway that has made the smartphone progressively more cumbersome to mount about the dorsum of the hand. Furthermore, the smartphone utilizes an inertial sensor package that is not certified for medical analysis, and the trial data access a provisional Cloud computing environment through an email account. These concerns are resolved with the recent development of a conformal wearable and wireless inertial sensor system. This conformal wearable and wireless system mounts to the hand with the profile of a bandage by adhesive and accesses a secure Cloud computing environment through a segmented wireless connectivity strategy involving a smartphone and tablet. Additionally, the conformal wearable and wireless system is certified by the FDA of the United States of America for ascertaining medical grade inertial sensor data. These characteristics make the conformal wearable and wireless system uniquely suited for the quantification of Parkinson’s disease treatment through deep brain stimulation. Preliminary evaluation of the conformal wearable and wireless system is demonstrated through the differentiation of deep brain stimulation set to “On” and “Off” status. Based on the robustness of the acceleration signal, this signal was selected to quantify hand tremor for the prescribed deep brain stimulation settings. Machine learning classification using the Waikato Environment for Knowledge Analysis (WEKA) was applied using the multilayer perceptron neural network. The multilayer perceptron neural network achieved considerable classification accuracy for distinguishing between the deep brain stimulation system set to “On” and “Off” status through the quantified acceleration signal data obtained by this recently developed conformal wearable and wireless system. The research achievement establishes a progressive pathway to the future objective of achieving deep brain stimulation capabilities that promote closed-loop acquisition of configuration parameters that are uniquely optimized to the individual through extrinsic means of a highly conformal wearable and wireless inertial sensor system and machine learning with access to Cloud computing resources. 展开更多
关键词 Parkinson’s Disease Deep Brain Stimulation WEARABLE and WIRELESS Systems CONFORMAL WEARABLE Machine Learning Inertial Sensor ACCELEROMETER WIRELESS ACCELEROMETER Hand Tremor Cloud Computing network centric THERAPY
下载PDF
Intelligent Resources Management System Design in Information Centric Networking 被引量:2
13
作者 Hengyang Zhang Shixiang Zhu +2 位作者 Renchao Xie Tao Huang Yunjie Liu 《China Communications》 SCIE CSCD 2017年第8期105-123,共19页
Information centric networking(ICN) is a new network architecture that is centred on accessing content. It aims to solve some of the problems associated with IP networks, increasing content distribution capability and... Information centric networking(ICN) is a new network architecture that is centred on accessing content. It aims to solve some of the problems associated with IP networks, increasing content distribution capability and improving users' experience. To analyse the requests' patterns and fully utilize the universal cached contents, a novel intelligent resources management system is proposed, which enables effi cient cache resource allocation in real time, based on changing user demand patterns. The system is composed of two parts. The fi rst part is a fi ne-grain traffi c estimation algorithm called Temporal Poisson traffi c prediction(TP2) that aims at analysing the traffi c pattern(or aggregated user requests' demands) for different contents. The second part is a collaborative cache placement algorithm that is based on traffic estimated by TP2. The experimental results show that TP2 has better performance than other comparable traffi c prediction algorithms and the proposed intelligent system can increase the utilization of cache resources and improve the network capacity. 展开更多
关键词 information centric networking traffi c estimation cache resources allocation time series analysis intelligent analysis
下载PDF
Topology-Based Data Dissemination Approaches for Large Scale Data Centric Networking Architecture
14
作者 陈佳 张宏科 周华春 《China Communications》 SCIE CSCD 2013年第9期80-96,共17页
Massive information flows are gen- erated from interactive processing and visua- lizations. To efficiently support information transmission over the Interact, information cen- tric architecture has been recently propo... Massive information flows are gen- erated from interactive processing and visua- lizations. To efficiently support information transmission over the Interact, information cen- tric architecture has been recently proposed. In this paper, we consider an information centric architecture, called the data centric networking architecture to provide communication servi- ces to big data, where a service identifier is used to name the data objects. We propose dif- ferent approaches for the dissemination of data objects in a large-scale data centric network. In particular, we propose various approaches to link the data dissemination approach with the topology of the Internet. Further, we eva- luate the proposed approaches with respect to data delivery efficiency, round-trip time imp- rovement, and deployment cost. Based on the results obtained from this study, it can be sh- own that by disseminating data objects to small ISPs, the data delivery efficiency can be significantly improved within an acceptable deployment cost. 展开更多
关键词 data centric networking data dis-semination topology-based
下载PDF
Smart control plane for information centric network-internet service provider networks
15
作者 SEBAKOR Mahamah THEERA-UMPON Nipon AUEPHANWIRIYAKUL Sansanee 《Journal of Central South University》 SCIE EI CAS CSCD 2018年第10期2410-2422,共13页
The information centric network(ICN)has been widely discussed in current researches.The ICN interoperation with a traditional IP network and caching methods are one of the research topics of interest.For economic reas... The information centric network(ICN)has been widely discussed in current researches.The ICN interoperation with a traditional IP network and caching methods are one of the research topics of interest.For economic reasons,the capability of applying the ICN to internet service providers(ISPs)with various traditional IP protocols already implemented,especially IGP,MPLS,VRF,and TE,does not require any change on the IP network infrastructure.The biggest concern of ISPs is related to their customers’contents delivery speed.In this paper,we consider ICN caching locations in ISP by using the concept of locator/ID separation protocol(LISP)for interoperation between a traditional IP address and name-based ICN.To be more specific,we propose a new procedure to determine caching locations in the ICN by using the cuckoo search algorithm(CSA)for finding the best caching locations of information chunks.Moreover,we create the smart control plane(SCP)scheme which is an intelligent controlling,managing,and mapping system.Its function is similar to the software defined network concept.We show how the proposed SCP system works in both synthetic small network and real-world big network.Finally,we show and evaluate the performance of our algorithm comparison with the simple search method using the shortest path first algorithm. 展开更多
关键词 information centric network(ICN) smart control plane caching allocation IP-ICN interoperation cuckoo search algorithm
下载PDF
An Efficient Update Strategy for Content Synchronization in Content-Centric Networking(CCN)
16
作者 Nidhi Lal Shishupal Kumar Vijay Kumar Chaurasiya 《China Communications》 SCIE CSCD 2019年第1期108-118,共11页
Content-centric Networking(CCN) is progressively flattering the substitutable approach to the Internet architecture through illuminating information(content) dissemination on the Internet with content forenames.The em... Content-centric Networking(CCN) is progressively flattering the substitutable approach to the Internet architecture through illuminating information(content) dissemination on the Internet with content forenames.The emergent proportion of Internet circulation has expectant adjusting Content-centric architecture to enhance serve the user prerequisites of accessing content.In recent years,one of the key aspects of CCN is ubiquitous in-network caching,which has been widely received great attention in research interest.One foremost shortcoming of in-network caching is that content producers have no awareness about where their content is put in storage.Because routers in CCN have caching capabilities,therefore,each and every content router can cache the content item in its storage capacity.This is problematic in the case in which a producer wishes to update or make the changes in its content item.In this paper,we present an approach regarding how to address this issue with a scheme called efficient content update(ECU).Our proposed ECU scheme achieves content update via trifling packets that resemble contemporary CCN communication messages with the use of additional table.We measure the performance of ECU scheme by means of simulations and make available a comprehensive exploration of its results. 展开更多
关键词 content-centric network ROUTING performance CACHING CONTENT delivery
下载PDF
Super Node Routing Strategy in Content-Centric Networking
17
作者 苗春浇 张宏科 +2 位作者 周华春 董平 沈烁 《Transactions of Tianjin University》 EI CAS 2015年第2期122-128,共7页
There were two strategies for the data forwarding in the content-centric networking(CCN): forwarding strategy and routing strategy. Forwarding strategy only considered a separated node rather than the whole network pe... There were two strategies for the data forwarding in the content-centric networking(CCN): forwarding strategy and routing strategy. Forwarding strategy only considered a separated node rather than the whole network performance, and Interest flooding led to the network overhead and redundancy as well. As for routing strategy in CCN, each node was required to run the protocol. It was a waste of routing cost and unfit for large-scale deployment.This paper presents the super node routing strategy in CCN. Some super nodes selected from the peer nodes in CCN were used to receive the routing information from their slave nodes and compute the face-to-path to establish forwarding information base(FIB). Then FIB was sent to slave nodes to control and manage the slave nodes. The theoretical analysis showed that the super node routing strategy possessed robustness and scalability, achieved load balancing,reduced the redundancy and improved the network performance. In three topologies, three experiments were carried out to test the super node routing strategy. Network performance results showed that the proposed strategy had a shorter delay, lower CPU utilization and less redundancy compared with CCN. 展开更多
关键词 content-centric networkING ROUTING STRATEGY super NODES SLAVE NODES
下载PDF
CMLP: Exploiting Caches at Multiple Levels of Proxies to Enhance Seamless Mobility Support in Information-Centric Networks
18
作者 Haoqiu Huang Lanlan Rui +2 位作者 Weiwei Zheng Danmei Niu Xuesong Qiu 《China Communications》 SCIE CSCD 2016年第10期86-107,共22页
The recent evolution of the Internet towards "Information-centric" transfer modes has renewed the interest in exploiting proxies to enhance seamless mobility. In this work, we focus on the case of multiple l... The recent evolution of the Internet towards "Information-centric" transfer modes has renewed the interest in exploiting proxies to enhance seamless mobility. In this work, we focus on the case of multiple levels of proxies in ICN architectures, in which content requests from mobile subscribers and the corresponding items are proactively cached to these proxies at different levels. Specifically, we present a multiple-level proactive caching model that selects the appropriate subset of proxies at different levels and supports distributed online decision procedures in terms of the tradeoff between delay and cache cost. We show via extensive simulations the reduction of up to 31.63% in the total cost relative to Full Caching, in which caching in all 1-level neighbor proxies is performed, and up to 84.21% relative to No Caching, in which no caching is used. Moreover, the proposed model outperforms other approaches with a flat cache structure in terms of the total cost. 展开更多
关键词 Information-centric networking mobility multiple levels of proxies PUBLISH-SUBSCRIBE
下载PDF
Neighborhood-Based In-Network Caching for Information-Centric Networks
19
作者 Shou-Chih Lo Jhih-Sian Hu Varsha A. Kshirsagar 《International Journal of Communications, Network and System Sciences》 2017年第8期76-87,共12页
The current Internet is based on host-centric networking, and a user needs to know the host address before reaching a data target in the network. The new architecture of information-centric networking (ICN) facilitate... The current Internet is based on host-centric networking, and a user needs to know the host address before reaching a data target in the network. The new architecture of information-centric networking (ICN) facilitates users to locate data targets by giving their data names without any information about host addresses. In-network caching is one of the prominent features in ICN, which allows network routers to cache data contents. In this paper, we emphasize the management of in-network cache storage, and this includes the mechanisms of cache replacement and cache replication. A new cost function is then proposed to evaluate each cache content and the least valuable content is evicted when cache is full. To increase cache utilization, a cooperative caching policy among neighboring routers is proposed. The proper network locations to cache data contents are also discussed in the paper. Experimental results show the superiority of the proposed caching policy than some traditional caching polices. 展开更多
关键词 Information-centric networkING Named Data networkING CACHE Management COOPERATIVE CACHING
下载PDF
Content Centric Networking: A New Approach to Big Data Distribution
20
作者 Yi Zhu Zhengkun Mi 《ZTE Communications》 2013年第2期3-10,共8页
In this paper, we explore network architecture anal key technologies for content-centric networking (CCN), an emerging networking technology in the big-data era. We descrihe the structure anti operation mechanism of... In this paper, we explore network architecture anal key technologies for content-centric networking (CCN), an emerging networking technology in the big-data era. We descrihe the structure anti operation mechanism of tl CCN node. Then we discuss mobility management, routing strategy, and caching policy in CCN. For better network performance, we propose a probability cache replacement policy that is based on cotent popularity. We also propose and evaluate a probability cache with evicted copy-up decision policy. 展开更多
关键词 big data content-centric networking caching policy mobility management routing strategy
下载PDF
上一页 1 2 50 下一页 到第
使用帮助 返回顶部