• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Niu Xinzheng, She Kun, Qin Ke, Zhou Mingtian. A Cooperative Caching Optimized Policy of Mobile Peer-to-Peer Networks[J]. Journal of Computer Research and Development, 2008, 45(4): 656-665.
Citation: Niu Xinzheng, She Kun, Qin Ke, Zhou Mingtian. A Cooperative Caching Optimized Policy of Mobile Peer-to-Peer Networks[J]. Journal of Computer Research and Development, 2008, 45(4): 656-665.

A Cooperative Caching Optimized Policy of Mobile Peer-to-Peer Networks

More Information
  • Published Date: April 14, 2008
  • Mobile P2P network is topology dynamic, mobile nodes resource limited, and network resource short. Considering the limitation of network resources and shortage of peer resources, how to make full use of mobile nodes' cooperative cache resources effectively and increase mobile nodes' cooperation is a challenging task to reduce network delay, save bandwidth and prevent congestion in mobile P2P networks. To solve this problem, the limited cooperative cache replacement policy establishment, the sufficient cooperative cache resource use and the key data buffering are discussed in detail in this paper. Moreover, according to the idea of ant colony algorithm, a cooperative cache replacement policy based on the pheromone is proposed, and a mathematical model and the derivation of choosing appropriate memory space as cooperative cache are established. The theory analysis and experiment results of this paper show that the new policy can significantly improve cooperative cache resource utility and improve network performance efficiently. It also can promote the mobile nodes' cooperation and success ratio of resource obtainment from neighbor nodes and reduce the average response delay of cooperative cache resource request.
  • Related Articles

    [1]Zheng Xiao, Gao Han, Wang Xiujun, Qin Feng. Contact Duration Aware Cooperative Data Caching in Mobile Opportunistic Networks[J]. Journal of Computer Research and Development, 2018, 55(2): 338-345. DOI: 10.7544/issn1000-1239.2018.20160929
    [2]Su Wen, Zhang Longbing, Gao Xiang, Su Menghao. A Cache Locking and Direct Cache Access Based Network Processing Optimization Method[J]. Journal of Computer Research and Development, 2014, 51(3): 681-690.
    [3]Zhao Xinjie, Wang Tao, Guo Shize, Liu Huiying. Cache Attacks on Block Ciphers[J]. Journal of Computer Research and Development, 2012, 49(3): 453-468.
    [4]Zhao Xinjie, Wang Tao, Guo Shize, Liu Huiying. Cache Attacks on Block Ciphers[J]. Journal of Computer Research and Development, 2012, 49(3): 453-468.
    [5]Wu Junjie, Yang Xuejun, Zeng Kun, Zhang Baida, Feng Quanyou, Liu Guanghui, and Tang Yuhua. DOOC: A Software/Hardware Co-managed Cache Architecture for Reducing Cache Thrashing[J]. Journal of Computer Research and Development, 2008, 45(12): 2020-2032.
    [6]Zhou Qian, Feng Xiaobing, and Zhang Zhaoqing. Software Pipelining with Cache Profiling Information[J]. Journal of Computer Research and Development, 2008, 45(5): 834-840.
    [7]Zhou Hongwei, Zhang Chengyi, and Zhang Minxuan. A Method of Statistics-Based Cache Leakage Power Estimation[J]. Journal of Computer Research and Development, 2008, 45(2): 367-374.
    [8]Chen Gang, Zhang Weiwen, and Wu Guoxin. Replacement Solutions for Streaming Cache on P2P Network[J]. Journal of Computer Research and Development, 2007, 44(11): 1857-1865.
    [9]Huan Dandan, Li Zusong, Hu Weiwu, Liu Zhiyong. A Cache Adaptive Write Allocate Policy[J]. Journal of Computer Research and Development, 2007, 44(2): 348-354.
    [10]Ma Zhiqiang, Ji Zhenzhou, and Hu Mingzeng. A Low-Power Instruction Cache Design Based on Record Buffer[J]. Journal of Computer Research and Development, 2006, 43(4): 744-751.

Catalog

    Article views (861) PDF downloads (503) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return