CN112769590B - Software defined content distribution network server selection method based on blockchain - Google Patents
Software defined content distribution network server selection method based on blockchain Download PDFInfo
- Publication number
- CN112769590B CN112769590B CN202011276492.9A CN202011276492A CN112769590B CN 112769590 B CN112769590 B CN 112769590B CN 202011276492 A CN202011276492 A CN 202011276492A CN 112769590 B CN112769590 B CN 112769590B
- Authority
- CN
- China
- Prior art keywords
- network
- controller
- data
- server
- content distribution
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0803—Configuration setting
- H04L41/0823—Configuration setting characterised by the purposes of a change of settings, e.g. optimising configuration for enhancing reliability
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0896—Bandwidth or capacity management, i.e. automatically increasing or decreasing capacities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1001—Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers
- H04L67/1004—Server selection for load balancing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/50—Reducing energy consumption in communication networks in wire-line communication networks, e.g. low power modes or reduced link rate
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention discloses a software defined content distribution network server selection mode based on a blockchain, which realizes safe and reliable transmission of data by constructing a alliance blockchain network in an SDN control layer, effectively aims at network threat, designs a logic structure of a software defined content distribution network controller based on the blockchain, extracts a switch network topological structure by analyzing a network data packet, selects an optimal content proxy server from a global view, and simultaneously solves the simultaneous optimization problem of server and path selection in the software defined content distribution network by a model predictive control method, thereby improving network efficiency.
Description
Technical Field
The invention relates to the technical field of communication, in particular to a software defined content distribution network server selection mode based on a block chain.
Background
More and more network traffic is provided through a content delivery network, and a CDN can provide quick and reliable delivery service by delivering source station content to nodes closer to users, so that the response speed and success rate of user access are improved, the problem of access delay caused by distribution, bandwidth and server performance is solved, and the network utility is improved. However, most of the existing CDN architectures are based on geographic DNS selection servers, and the domain name resolution servers route the content to the nearest proxy server, but the geographic location is not necessarily the best choice of the routing request recently, so that in order to provide the client with the best replica proxy server, the CDN network global needs to be monitored and adjusted, but the CDN does not understand the network topology and cannot sense the global network state information.
A Software Defined Network (SDN) separates the data forwarding plane from the control plane, and a switch is only responsible for the data plane, and pulls the control part of the traditional switching device away and concentrates it on an independent controller. The controller issues rules to the switching device in the form of a flow table, thereby regulating and controlling the forwarding path and forwarding rate in the data forwarding plane. In addition, SDN possesses programmable characteristics, reduces system maintenance cost. The software defined content distribution network makes up for incomplete and inaccurate acquisition of the underlying network information by the CDN through integrating network, storage and calculation resources, and meanwhile, the underlying network resources can be dynamically allocated through programming to bear the task and function of indirectly acquiring the network information by the CDN part, thereby not only reducing the load of the CDN, but also enhancing the control of the underlying network. However, software-defined content distribution networks still face many security challenges in practice, and conventional centralized SDN controllers themselves are prone to single point failures in an antagonistic scenario, while distributed controllers are more prone to internal attacks, facing reliability and reputation issues.
With the great success of bitcoin cryptocurrency, blockchain technology has received great academic attention. The blockchain may use a peer-to-peer network to validate each new transaction, which can be added to the blockchain only after validation is successful. In this case, the blockchain allows mutually exclusive parties to exchange information or data without the need for trusted third parties. Thus, blockchain techniques may help to enhance the security of distributed controllers and various forwarding devices in the data plane, improving the robustness of the software-defined content distribution network.
Disclosure of Invention
The present invention is directed to providing a software defined content distribution network server selection method based on blockchain to solve the above-mentioned problems in the background art.
In order to achieve the above purpose, the present invention provides the following technical solutions:
a blockchain-based software defined content distribution network server selection method, comprising the steps of:
step one: optimizing the average response time of the user and the bandwidth satisfaction conversion of the user;
step two: optimizing the average response time of the user, wherein the average response time is the round trip delay of the user and comprises the round trip link delay and the processing delay of a server;
step three: the performance change of the algorithm is analyzed by changing the weight value, and the weight occupied by two optimization targets of response time and bandwidth satisfaction is balanced by adjusting the weight value according to actual network requirements.
In the first step, define the system state at the time t as Z t ,N t The system input of MPC is p for the total request number in the system at the time t l,s (t), CDN proxy server set s= {1,2,..s. }, path set l= {1,2,..l. }.
In the second step, the server is regarded as an M/M/1 queuing model, and the processing time of the server can be expressed as
υ t Indicating the arrival rate of the request at time t s For the processing speed of the server, p s (t) is the probability that the task is handled by the proxy server s;
in SDN network, the controller can acquire the global state information of the network, including link delay, and the link delay detected by the controller is used as d l Indicating that the average round trip delay of the user request is:
wherein p is l,s And (t) is the probability that the task is processed by the proxy server s through the path l.
In the third step, a time delay optimizing function J is defined a The method comprises the following steps:
wherein T is a certain initial time, such as an initial time of the system, k is a certain current time of the system, and T is a set feedback time gap;
then consider the bandwidth satisfaction of the user, the ratio of the bandwidth actually provided by the network and the bandwidth requested by the user, so the user bandwidth satisfaction on the link I deviates from B l (t) is defined as follows:
average size of R user request, [ x ]] + Representing that when x > 0, the value is x per se, and when x is less than or equal to 0, the value is 0, so that an optimization function J of bandwidth satisfaction offset is defined b The method comprises the following steps:
finally consider reducing system input P l.s The variation of (t) to maintain the stability of the system, a third optimization function J is defined c The method comprises the following steps:
in order to consider three optimization functions simultaneously, a joint optimization function is defined as J a +ω b J b +ω c J c Wherein omega b And omega c Respectively J b And J c Relative to J a By solving the nonlinear programming problem, all p in each time slot of t+1.ltoreq.k.ltoreq.t+T can be calculated l,s Value of (t):
minJ a +ω b J b +ω c J c
based on a software defined content distribution network server selection mode based on a blockchain, the constructed network architecture is based on the existing SDN architecture, and the software defined content distribution network architecture based on the blockchain is provided, so that the controller data tampering and illegal controller access are effectively prevented, and the network architecture is divided into an application layer, a control layer and a data layer from top to bottom;
application layer: including different software defined content distribution network applications;
control layer: the system comprises one or more SDN controllers based on software, monitors network forwarding behaviors through a southbound interface, provides a control function, communicates through a northbound interface, a network application program and a server to realize network management and security, and simultaneously, the control logic maps network requirements of the application program into instructions of network element resources to obtain global information of a bottom network, including network topology and state information;
data layer: is a bottom plane, does not have control logic, and consists of network equipment such as routers, physical/virtual switches, access points and the like.
The internal logic structure of the Control layer serves as a alliance chain node for the SDN controller, so that the safety of network data exchange is guaranteed, and the Control layer comprises five main modules including Packet Parser, view Builder, verifier, control block and other.
The north interface is positioned between the control plane and the application plane, an application program at the upper layer obtains a network resource at the lower layer through the north interface and sends data to the network at the lower layer through the north interface;
the southbound interface is located between the data plane and the control plane, and is responsible for data exchange and interaction operations between the SDN controller and the network elements.
Packet Parser includes: analyzing a data Packet sent by the switch, wherein the data Packet comprises Packet In, flow Mod, stats Reply and Features Reply;
packet In is the signaling that the switch requests the flow table from the controller;
the Flow Mod is the signaling of the downstream table after the controller processes the request;
stats Reply contains state information of the switch;
the Features Reply is the functional characteristic information of the switch, and comprises a path identifier path id and flow table information such as Flow Entry;
packet Parser dynamically monitors and parses packets that are incoming to the controller, extracting important metadata sets.
View Builder is responsible for analyzing the metadata set, extracting the network topology structure and state information of the switch, and plays an important role in network fault location and reasonable network optimization.
Verifiers are necessary to verify the legitimacy of a node in order to prevent an attacker from compromising system security by modifying the data of the data packets or injecting additional data packets from the point of view of system security.
The block structure generated by the Control block controller comprises a hash value of a previous block, a root node of the merck tree, a time stamp, a block chain signature, network static information and behavior information.
Other includes functions such as load balancing, trust evaluation, intrusion detection, security policy, etc., from the perspective of scalability, the controller can dynamically expand new functions, flexibly provide expansion services, and meet new market demands:
the load balancing module can reasonably and efficiently balance flow resources, fully utilize link resources of the network, improve network throughput and reduce network transmission delay;
the trust evaluation module performs trust evaluation according to the dynamic and static state data of the controller, wherein the trust value is used as the basis for selecting the security policy of the controller on one hand and used as the basis for selecting the master node by the block chain consensus algorithm on the other hand;
the intrusion detection module monitors network transmission in real time, and gives an alarm or takes active reaction measures when suspicious transmission is found;
the security policy module specifies contract contents in advance through intelligent contracts of the blockchain, and when the intrusion detection triggers contract conditions, the program automatically executes the contract contents to effectively resist and respond to attacks.
Compared with the prior art, the invention has the beneficial effects that: the software definition content distribution network controller logic structure based on the blockchain is designed, the switch network topology structure is extracted by analyzing network data packets, the optimal content proxy server is selected from the global view, and simultaneously, the simultaneous optimization problem of server and path selection in the software definition content distribution network is solved by a model predictive control method, so that network efficiency is improved.
Drawings
FIG. 1 is a block chain based software defined content distribution network architecture in accordance with the present invention;
FIG. 2 is a block chain based software defined content distribution network controller logic architecture in accordance with the present invention;
FIG. 3 is a graph comparing CPU utilization in a conventional content delivery network server selection scheme with the present invention;
FIG. 4 is a graph showing the change of the broken line corresponding to the bar graph in FIG. 3 in actual comparison;
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without creative efforts, are within the protection scope of the invention.
Examples
Referring to fig. 1-4, the present invention provides a technical solution: a block chain based software defined content distribution network server selection method, characterized in that: the method comprises the following steps:
step one: optimizing the average response time of the user and the bandwidth satisfaction conversion of the user;
step two: optimizing the average response time of the user, wherein the average response time is the round trip delay of the user and comprises the round trip link delay and the processing delay of a server;
step three: the performance change of the algorithm is analyzed by changing the weight value, and the weight occupied by two optimization targets of response time and bandwidth satisfaction is balanced by adjusting the weight value according to actual network requirements.
In the first step, define the system state at the time t as Z t ,N t The system input of MPC is p for the total request number in the system at the time t l,s (t), CDN proxy server set s= {1,2,..s. }, path set l= {1,2,..l. }.
In the second step, the server is regarded as an M/M/1 queuing model, and the processing time of the server can be expressed as
υ t Indicating the arrival rate of the request at time t s For the processing speed of the server, p s (t) is the probability that the task is handled by the proxy server s;
in SDN network, the controller can acquire the global state information of the network, including link delay, and the link delay detected by the controller is used as d l Indicating that the average round trip delay of the user request is:
wherein p is l,s And (t) is the probability that the task is processed by the proxy server s through the path l.
In the third step, a time delay optimizing function J is defined a The method comprises the following steps:
wherein T is a certain initial time, such as an initial time of the system, k is a certain current time of the system, and T is a set feedback time gap;
then consider the bandwidth satisfaction of the user,the ratio of the bandwidth actually available to the network to the bandwidth size requested by the user, so the user bandwidth on link l satisfies the degree offset B l (t) is defined as follows:
average size of R user request, [ x ]] + Representing that when x > 0, the value is x per se, and when x is less than or equal to 0, the value is 0, so that an optimization function J of bandwidth satisfaction offset is defined b The method comprises the following steps:
finally consider reducing system input P l.s The variation of (t) to maintain the stability of the system, a third optimization function J is defined c The method comprises the following steps:
in order to consider three optimization functions simultaneously, a joint optimization function is defined as J a +ω b J b +ω c J c Wherein omega b And omega c Respectively J b And J c Relative to J a By solving the nonlinear programming problem, all p in each time slot of t+1.ltoreq.k.ltoreq.t+T can be calculated l,s Value of (t):
minJ a +ω b J b +ω c J c
based on a software defined content distribution network server selection mode based on a blockchain, the constructed network architecture is based on the existing SDN architecture, and the software defined content distribution network architecture based on the blockchain is provided, so that the controller data tampering and illegal controller access are effectively prevented, and the network architecture is divided into an application layer, a control layer and a data layer from top to bottom;
application layer: including different software defined content distribution network applications;
control layer: the system comprises one or more SDN controllers based on software, monitors network forwarding behaviors through a southbound interface, provides a control function, communicates through a northbound interface, a network application program and a server to realize network management and security, and meanwhile, the control logic maps network requirements of the application program into instructions of network element resources to obtain global information of a bottom network, including network topology and state information;
data layer: is a bottom plane, does not have control logic, and consists of network equipment such as routers, physical/virtual switches, access points and the like.
The internal logic structure of the control layer serves as a alliance chain node for the SDN controller, so that the safety of network data exchange is ensured, and the network data exchange comprises five main modules PacketParser, viewBuilder, verifier, controlblock, others.
The north interface is positioned between the control plane and the application plane, an application program at the upper layer obtains a network resource at the lower layer through the north interface and sends data to the network at the lower layer through the north interface;
the southbound interface is located between the data plane and the control plane, and is responsible for data exchange and interaction operations between the SDN controller and the network elements.
Packet Parser includes: analyzing a data Packet sent by the switch, wherein the data Packet comprises Packet In, flow Mod, stats Reply and Features Reply;
packet In is the signaling that the switch requests the flow table from the controller;
the Flow Mod is the signaling of the downstream table after the controller processes the request;
stats Reply contains state information of the switch;
the Features Reply is the functional characteristic information of the switch, and comprises a path identifier path id and flow table information such as Flow Entry;
packet Parser dynamically monitors and parses packets that are incoming to the controller, extracting important metadata sets.
View Builder is responsible for analyzing the metadata set, extracting the network topology structure and state information of the switch, and plays an important role in network fault location and reasonable network optimization.
Verifiers are necessary to verify the legitimacy of a node in order to prevent an attacker from compromising system security by modifying the data of the data packets or injecting additional data packets from the point of view of system security.
The block structure generated by the Control block controller comprises a hash value of a previous block, a root node of the merck tree, a time stamp, a block chain signature, network static information and behavior information.
Other includes functions such as load balancing, trust evaluation, intrusion detection, security policy, etc., from the perspective of scalability, the controller can dynamically expand new functions, flexibly provide expansion services, and meet new market demands:
the load balancing module can reasonably and efficiently balance flow resources, fully utilize link resources of the network, improve network throughput and reduce network transmission delay;
the trust evaluation module performs trust evaluation according to the dynamic and static state data of the controller, wherein the trust value is used as the basis for selecting the security policy of the controller on one hand and used as the basis for selecting the master node by the block chain consensus algorithm on the other hand;
the intrusion detection module monitors network transmission in real time, and gives an alarm or takes active reaction measures when suspicious transmission is found;
the security policy module specifies contract contents in advance through intelligent contracts of the blockchain, and when the intrusion detection triggers contract conditions, the program automatically executes the contract contents to effectively resist and respond to attacks.
In the description of the present invention, unless explicitly stated and limited otherwise, the terms "mounted," "connected," and "fixed" are to be construed broadly, and may be, for example, fixedly connected, detachably connected, or integrally formed; can be mechanically or electrically connected; can be directly connected or indirectly connected through an intermediate medium, and can be communication between two elements or interaction relationship between the two elements. The specific meaning of the above terms in the present invention will be understood in specific cases by those of ordinary skill in the art.
Standard parts used in the invention can be purchased from the market, special-shaped parts can be customized according to the description of the specification and the attached drawings, the specific connection modes of all parts adopt conventional means such as mature bolts, rivets and welding in the prior art, the machinery, the parts and the equipment adopt conventional types in the prior art, and the circuit connection adopts conventional connection modes in the prior art, so that the details are not described.
Although embodiments of the present invention have been shown and described, it will be understood by those skilled in the art that various changes, modifications, substitutions and alterations can be made therein without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.
Claims (2)
1. A software defined content distribution network server selection method based on a blockchain constructs a network architecture, which is characterized in that: based on the existing SDN architecture, extracting a switch network topology structure by analyzing network data packets, selecting an optimal content proxy server from a global view, and providing a software-defined content distribution network architecture based on block chains, so as to prevent controller data tampering and illegal controller access, wherein the software-defined content distribution network architecture is divided into an application layer, a control layer and a data layer from top to bottom;
application layer: including different software defined content distribution network applications;
control layer: the network data exchange system consists of one or more SDN controllers based on software, wherein the control layer internal logic structure serves as a alliance chain node for the SDN controllers, an alliance network is formed by the connection of the alliance nodes, the security of network data exchange is ensured, and the network data exchange system comprises PacketParser, viewBuilder, verifier, controlblock, others five modules:
packet Parser includes: analyzing a data Packet sent by the switch, wherein the data Packet comprises Packet In, flow Mod, stats Reply and Features Reply;
packet In is the signaling that the switch requests the flow table from the controller;
the Flow Mod is the signaling of the downstream table after the controller processes the request;
stats Reply contains state information of the switch;
the Features Reply is the functional characteristic information of the switch, and comprises a path mark path id and flow table information;
packet Parser dynamically monitors and analyzes the data Packet transmitted to the controller, and extracts an important metadata set;
the View Builder is responsible for analyzing the metadata set, extracting the network topology structure and state information of the switch, and playing an important role in locating network faults and reasonably optimizing the network;
the Verifier is used for verifying the legitimacy of the node in order to prevent an attacker from damaging the system security by modifying data of the data packet or injecting additional data packets from the aspect of system security;
the block structure generated by the Control block controller comprises a hash value of a previous block, a root node of a merck tree, a time stamp, a block chain signature, network static information and behavior information;
other includes load balancing, trust evaluation, intrusion detection, security policy functions, from the perspective of scalability, the controller can dynamically expand new functions, flexibly provide expansion services, and meet new market demands:
the load balancing module can balance flow resources, fully utilize link resources of the network, improve network throughput and reduce network transmission delay;
the trust evaluation module performs trust evaluation according to the dynamic and static state data of the controller, wherein the trust value is used as the basis for selecting the security policy of the controller on one hand and used as the basis for selecting the master node by the block chain consensus algorithm on the other hand;
the intrusion detection module monitors network transmission in real time, and gives an alarm or takes active reaction measures when suspicious transmission is found;
the security policy module specifies contract contents in advance through intelligent contracts of the blockchain, and when the intrusion detection triggers contract conditions, the program automatically executes the contract contents to effectively resist and respond attacks;
the network forwarding behavior is monitored through the southbound interface, a control function is provided, communication is carried out through the northbound interface, the network application program and the server, so that network management and security are realized, meanwhile, the control logic maps the network requirements of the application program into the instructions of network element resources, and global information of a bottom layer network including network topology and state information can be obtained;
the north interface is positioned between the control plane and the application plane, an application program at the upper layer obtains a network resource at the lower layer through the north interface and sends data to the network at the lower layer through the north interface;
the southbound interface is positioned between the data plane and the control plane and is responsible for data exchange and interactive operation between the SDN controller and the network unit;
data layer: is a bottom plane, has no control logic, and consists of a router, a physical/virtual switch, and an access point network device.
2. A blockchain-based software defined content distribution network server selection method according to claim 1, characterized by: the method comprises the following steps:
step one: optimizing the average response time of the user and the bandwidth satisfaction conversion of the user;
step two: optimizing the average response time of the user, wherein the average response time is the round trip delay of the user, and comprises the link delay of round trip and the processing delay of a server;
step three: the performance change of the algorithm is analyzed by changing the weight value, and the weight occupied by two optimization targets of response time and bandwidth satisfaction is balanced by adjusting the weight value according to actual network requirements:
which defines a delay optimization function J a The method comprises the following steps:
wherein T is the initial time of the system, k is a certain current time of the system, and T is a set feedback time gap;
then consider the bandwidth satisfaction of the user, the ratio of the bandwidth actually provided by the network and the bandwidth requested by the user, so the user bandwidth satisfaction on the link I deviates from B l (t) is defined as follows:
r is the average size of the user request, [ x ]] + Representing that when x > 0, the value is x per se, and when x is less than or equal to 0, the value is 0, so that an optimization function J of bandwidth satisfaction offset is defined b The method comprises the following steps:
finally consider reducing system input P l.s The variation of (t) to maintain the stability of the system, a third optimization function J is defined c The method comprises the following steps:
in order to consider three optimization functions simultaneously, a joint optimization function is defined as J a +ω b J b +ω c J c Wherein omega b And omega c Respectively J b And J c Relative to J a By solving the nonlinear programming problem, all p in each time slot of t+1.ltoreq.k.ltoreq.t+T can be calculated l,s Value of (t):
minJ a +ω b J b +ω c J c
in the first step, define the system state at the time t as Z t ,N t The system input of MPC is p for the total request number in the system at the time t l,s (t), CDN proxy server set s= {1,2,..s. }, path set l= {1,2,..l. };
in the second step, the server is regarded as an M/M/1 queuing model, and the processing time of the server is expressed as
υ t Indicating the arrival rate of the request at time t s For the processing speed of the server, p s (t) is the probability that the task is handled by the proxy server s;
in SDN network, the controller can acquire the global state information of the network, including link delay, and the link delay detected by the controller is used as d l Indicating that the average round trip delay of the user request is:
wherein p is l,s And (t) is the probability that the task is processed by the proxy server s through the path l.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011276492.9A CN112769590B (en) | 2020-11-16 | 2020-11-16 | Software defined content distribution network server selection method based on blockchain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011276492.9A CN112769590B (en) | 2020-11-16 | 2020-11-16 | Software defined content distribution network server selection method based on blockchain |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112769590A CN112769590A (en) | 2021-05-07 |
CN112769590B true CN112769590B (en) | 2023-09-08 |
Family
ID=75693098
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011276492.9A Active CN112769590B (en) | 2020-11-16 | 2020-11-16 | Software defined content distribution network server selection method based on blockchain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112769590B (en) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106850859A (en) * | 2017-03-28 | 2017-06-13 | 浙江大学 | A kind of user's request distribution method of the CDN based on SDN |
CN107222478A (en) * | 2017-05-27 | 2017-09-29 | 暨南大学 | Software defined network key-course security mechanism construction method based on block chain |
CN108173827A (en) * | 2017-12-22 | 2018-06-15 | 南京邮电大学 | Distributed SDN control planes safety certifying method based on block chain thinking |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9461923B2 (en) * | 2013-12-06 | 2016-10-04 | Algoblu Holdings Limited | Performance-based routing in software-defined network (SDN) |
-
2020
- 2020-11-16 CN CN202011276492.9A patent/CN112769590B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106850859A (en) * | 2017-03-28 | 2017-06-13 | 浙江大学 | A kind of user's request distribution method of the CDN based on SDN |
CN107222478A (en) * | 2017-05-27 | 2017-09-29 | 暨南大学 | Software defined network key-course security mechanism construction method based on block chain |
CN108173827A (en) * | 2017-12-22 | 2018-06-15 | 南京邮电大学 | Distributed SDN control planes safety certifying method based on block chain thinking |
Also Published As
Publication number | Publication date |
---|---|
CN112769590A (en) | 2021-05-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Qureshi et al. | Anomaly detection and trust authority in artificial intelligence and cloud computing | |
Wibowo et al. | Multi-domain software defined networking: research status and challenges | |
Zhao et al. | Tapestry: A resilient global-scale overlay for service deployment | |
CA2637743C (en) | Method and apparatus for the assessment and optimization of network traffic | |
CN102891804B (en) | The method of adjustment and system of control strategy | |
CN103873379B (en) | A kind of distributed route based on overlay network is anti-to ruin tactics configuring method and system | |
CN101997826A (en) | Routing methods of control net element, forwarding net element and internet protocol network | |
CN105515998B (en) | A kind of method and system in the domain SPTN three layers of domain and two layers of domain intercommunication | |
Chou et al. | Behavior anomaly detection in SDN control plane: a case study of topology discovery attacks | |
Brinkmeier et al. | Optimally dos resistant p2p topologies for live multimedia streaming | |
KR20180122513A (en) | Method and framework for traffic engineering in network hypervisor of sdn-based network virtualization platform | |
CN114157605B (en) | Communication method, system, electronic equipment and computer readable storage medium | |
KR20220029142A (en) | Sdn controller server and method for analysing sdn based network traffic usage thereof | |
CN112769590B (en) | Software defined content distribution network server selection method based on blockchain | |
CN109150829A (en) | Software definition cloud network trust data distribution method, readable storage medium storing program for executing and terminal | |
Germanus et al. | Increasing the resilience of critical scada systems using peer-to-peer overlays | |
Mas-Machuca et al. | Reliable control and data planes for softwarized networks | |
CN110166364B (en) | Software defined opportunistic network flow table updating method | |
Zhang et al. | Efficient group rekeying using application-layer multicast | |
CN116723154A (en) | Route distribution method and system based on load balancing | |
Shao et al. | Accelerating bgp configuration verification through reducing cycles in smt constraints | |
AlShammari et al. | BL‐Hybrid: A graph‐theoretic approach to improving software‐defined networking‐based data center network performance | |
CN108900518A (en) | Believable software definition cloud network data distribution systems | |
Nikolchev et al. | Method of Routing Functions Virtualization in the Modern Networks. | |
CN113691388B (en) | LVS and SNMP protocol-based data acquisition system and method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |