2020
DOI: 10.1016/j.comcom.2020.03.021
|View full text |Cite
|
Sign up to set email alerts
|

Quality of Service provisioning in Named Data Networking via PIT entry reservation and PIT replacement policy

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 1 publication
0
4
0
Order By: Relevance
“…This model defines an objective function to minimize the PIT size subject to the interest drop probability as upper bound. In [11], an analytical model of two PIT replacement approaches is proposed. These approaches are called PIT replacement without reservation (PRWR) and PIT replacement with reservation (PRWR).…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…This model defines an objective function to minimize the PIT size subject to the interest drop probability as upper bound. In [11], an analytical model of two PIT replacement approaches is proposed. These approaches are called PIT replacement without reservation (PRWR) and PIT replacement with reservation (PRWR).…”
Section: Related Workmentioning
confidence: 99%
“…colorred the Bloom filter (BF) [11] is the most popular probabilistic data structure, used for membership query in a set. The Bloom filter consists of an m bits bit-array, initially all set to zero and k hash functions {h 1 , h 2 , ..., h k }, each one in range {0..., m − 1}.…”
Section: Bloom Filtermentioning
confidence: 99%
“…Despite being specifically built to prioritize mobility, the NDN framework encounters many obstacles that necessitate resolution to offer comprehensive support for mobile devices and users within its network. Some of the issues that arise in this context pertain to the effective management of smooth handoffs [13], modifying routing and forwarding decisions to accommodate dynamic changes in device locations [14], addressing security measures (such as the management of cryptographic keys and the revocation of digital certificates [15]), adapting to constrained resources (such as low processing power and battery capacity [16]), and addressing limited interoperability between different NDN implementations [17]. Notwithstanding these issues, NDN continues to hold promise as a viable option for content-centric networking and mobility.…”
Section: Introductionmentioning
confidence: 99%
“…The rapid development of computer technology is accompanied by network development, in this case the internet network [1]. Along with the increasing number of internet users, traffic on the network is increasingly complex and network management is required [2].…”
Section: Introductionmentioning
confidence: 99%