Computer Science ›› 2015, Vol. 42 ›› Issue (7): 156-161.doi: 10.11896/j.issn.1002-137X.2015.07.034

Previous Articles     Next Articles

Network Behavior-oriented CDN Cache Allocation Strategy

FENG Xiang YANG Tan LI Song   

  • Online:2018-11-14 Published:2018-11-14

Abstract: Lying behavior may destroy the fairness of CDN cache allocation.The selfish lying behavior of servers during CDN cache allocation with the game theory was studied.The essence of lying behavior is that servers will apply more cache when the total cache is not enough, otherwise honestly apply requisite cache volume when the total cache is enough.We proposed fairness algorithm to deal with lying behaviors.We considered the historical application volume while calculating the new one.In addition,we introduced the age factor to calculate the application’s effectiveness in different phase.In this way,we could urge the lying servers to stop lying by making them lose more than the honest ser-vers.At the same time,we guaranteed the optimal throughput of system and introduced price mechanism to make honest servers to be more demand-satisfying.The experiment shows the fairness algorithm has a good improvement for lying behavior.

Key words: Lying behavior,CDN cache allocation,Age factor,Price mechanism

[1] Wang Zhan,Jiang Hai,Sun Yi,et al.A k-coordinated decentra-lized replica placement algorithm for the ring-based CDN-P2P architecture[C]∥ 2010 IEEE Symposium on Computers and Communications (ISCC).2010:811-816
[2] Chen Jian-bo,Chen Chu-chuan.Using Particle Swarm Optimization Algorithm in Multimedia CDN Content placement[C]∥ 2012 Fifth International Symposium on Parallel Architectures,Algorithms and Programming(PAAP).2012:45-51
[3] 冯翔,刘智满,帅典勋.内容分布网络缓存资源并行分配的博弈粒子场方法[J].计算机学报,2007,30(3):368-379 Feng Xiang,Lau Francis C M,Shuai Dian-xun.A Novel Game Particle-Field Approach to Parallel Cache Resource Allocation of CDN[J].Chinese Journal of Computers,2007,30(3):368-379
[4] 乐光学,李仁发,陈志,等.P2P网络中搭便车行为分析与抑制机制建模[J].计算机研究与发展,2011,48(3):382-297Yue Guang-xue,Li Ren-fa,Chen Zhi,et al.Analysis of Free-ri-ding Behaviors and Modeling Restrain Mechanisms for Peer-to-Peer Networks[J].Journal of Computer Research and Development,2011,48(3):382-397
[5] Tang Ping-zhong,Yoav Shoham,Lin Fang-zhen.Designing competitions between teams of individuals[J].Artificial Intelligence,2010,174(11):749-766
[6] Meir R,Procaccia A D,Rosenschein J S.Algorithm for strategyproof classification[J].Artificial Intelligence,2012,186:123-156
[7] Teacy W T L,Luck M,Rogers A,et al.An efficient and versatile approach to trust and reputation using hierarchical Bayesian modelling[J].Aritificial Intelligence,2012,193(6):149-185
[8] Guo Ming-yu,Conitzer V.Optimal-in-expectation redistribution mechanisms[J].Artificial Intelligence,2010,174(5/6):363-381
[9] Kaizoji T.Multiple equilibria and chaos in a discrete tatonnement process[J].Journal of Economic Behavior & Organization,2010,76(3):597-599
[10] Kitti M.Convergence of iterative tatonnement without pricenormalization[J].Journal of Economic Dynamics & Control,2010,34(6):1077-1091
[11] Mersch,Danielle P,Crespi A,et al.Tracking individuals shows spatial fidelity is a key regulator of ant social organization[J].Science 340,2013(6136):1090-1093

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!