首页 > 最新文献

2009 IEEE International Conference on Network Infrastructure and Digital Content最新文献

英文 中文
Security mechanism for distribution automation using EPON 基于EPON的配电自动化安全机制
Pub Date : 2009-12-31 DOI: 10.1109/ICNIDC.2009.5360954
Zhongwei Sun, Yaning Ma, Qingrui Guo, Fengjie Sun
In electrical power industry, a reliable communication network constitutes the core of the distribution automation system (DAS). This paper first proposes a novel communication method for distribution automation using Ethernet Passive Optical Networks (EPON). Then, based on the symmetric cryptographic techniques, a secure DAS communication architecture is presented. Following the standard registration procedure, the mutual device authentication between the OLT and the ONU is finally implemented.
在电力工业中,可靠的通信网络是配电自动化系统的核心。本文首先提出了一种基于以太网无源光网络(EPON)的配电自动化通信方法。然后,基于对称密码技术,提出了一种安全的DAS通信体系结构。按照标准的注册流程,最终实现OLT和ONU之间的互设备认证。
{"title":"Security mechanism for distribution automation using EPON","authors":"Zhongwei Sun, Yaning Ma, Qingrui Guo, Fengjie Sun","doi":"10.1109/ICNIDC.2009.5360954","DOIUrl":"https://doi.org/10.1109/ICNIDC.2009.5360954","url":null,"abstract":"In electrical power industry, a reliable communication network constitutes the core of the distribution automation system (DAS). This paper first proposes a novel communication method for distribution automation using Ethernet Passive Optical Networks (EPON). Then, based on the symmetric cryptographic techniques, a secure DAS communication architecture is presented. Following the standard registration procedure, the mutual device authentication between the OLT and the ONU is finally implemented.","PeriodicalId":127306,"journal":{"name":"2009 IEEE International Conference on Network Infrastructure and Digital Content","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130633543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Development of a Roboid component for Player/Stage Robot Simulator 玩家/舞台机器人模拟器的Roboid组件的开发
Pub Date : 2009-12-31 DOI: 10.1109/ICNIDC.2009.5360909
Jun Won Lim, Sanghoon Lee, I. Suh, Kyung Jin Kim
Simulation environment is very useful as it provides ground to virtually embody robots in the designing stage. There will be applied Player/Stage, one of the robot simulation and control environments, to Roboid Studio which is a component-based framework. Here, robots are controlled based on simulacrum. Several issues will be discussed to get Player/Stage to work as a component for Roboid Studio.
仿真环境是非常有用的,因为它提供了在设计阶段虚拟体现机器人的基础。将应用Player/Stage,机器人模拟和控制环境之一,到Roboid Studio,这是一个基于组件的框架。在这里,机器人是基于simulacrum控制的。为了让Player/Stage成为Roboid Studio的一个组件,我们将讨论几个问题。
{"title":"Development of a Roboid component for Player/Stage Robot Simulator","authors":"Jun Won Lim, Sanghoon Lee, I. Suh, Kyung Jin Kim","doi":"10.1109/ICNIDC.2009.5360909","DOIUrl":"https://doi.org/10.1109/ICNIDC.2009.5360909","url":null,"abstract":"Simulation environment is very useful as it provides ground to virtually embody robots in the designing stage. There will be applied Player/Stage, one of the robot simulation and control environments, to Roboid Studio which is a component-based framework. Here, robots are controlled based on simulacrum. Several issues will be discussed to get Player/Stage to work as a component for Roboid Studio.","PeriodicalId":127306,"journal":{"name":"2009 IEEE International Conference on Network Infrastructure and Digital Content","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116298173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A novel scheme for the transmission of P2P service in the broadband access network 提出了一种在宽带接入网中传输P2P业务的新方案
Pub Date : 2009-12-31 DOI: 10.1109/ICNIDC.2009.5360851
Dongchao Ma, Xue Chen, Ning Wang, N. Zhang
This paper proposed a redirection scheme used in the broadband access network to optimize the transmission of p2p service. The excellent performance of the proposed scheme in decreasing the burden of the core network data is verified through the simulations with NS2.
提出了一种用于宽带接入网的重定向方案,以优化p2p业务的传输。通过NS2的仿真验证了该方案在降低核心网数据负担方面的优异性能。
{"title":"A novel scheme for the transmission of P2P service in the broadband access network","authors":"Dongchao Ma, Xue Chen, Ning Wang, N. Zhang","doi":"10.1109/ICNIDC.2009.5360851","DOIUrl":"https://doi.org/10.1109/ICNIDC.2009.5360851","url":null,"abstract":"This paper proposed a redirection scheme used in the broadband access network to optimize the transmission of p2p service. The excellent performance of the proposed scheme in decreasing the burden of the core network data is verified through the simulations with NS2.","PeriodicalId":127306,"journal":{"name":"2009 IEEE International Conference on Network Infrastructure and Digital Content","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127790542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Memory-efficient regular expression matching for Chinese network content audit 面向中文网络内容审计的高效内存正则表达式匹配
Pub Date : 2009-12-31 DOI: 10.1109/ICNIDC.2009.5360785
Zezhi Zhu, Ping Lin, Luying Chen, Kun Zhang
When match against Chinese keyword for network content audit, one of the biggest problems is that there is interference of “noise characters”, it makes the traditional way using explicit string pattern to match infeasible. Regular expression matching can solve the problem perfectly, but the DFA-base approaches for regular expression matching will also encounter the problem of excessive memory usage. In this paper, we try to solve the problem encountered when applying regular expression to Chinese network content audit. We propose a regular expression rewriting techniques and grouping principle that can solve excessive memory usage problem in DFA-based approach. Our solution can make it possible to apply regular expression to Chinese network content audit.
针对网络内容审计的中文关键字进行匹配时,最大的问题之一是存在“噪声字符”的干扰,使得传统使用显式字符串模式进行匹配的方式无法实现。正则表达式匹配可以很好地解决这个问题,但是基于dfa的正则表达式匹配方法也会遇到内存使用过多的问题。本文试图解决正则表达式在中文网络内容审计中遇到的问题。我们提出了正则表达式重写技术和分组原则,可以解决基于dfa的方法中内存使用过多的问题。我们的解决方案使正则表达式在中文网络内容审计中的应用成为可能。
{"title":"Memory-efficient regular expression matching for Chinese network content audit","authors":"Zezhi Zhu, Ping Lin, Luying Chen, Kun Zhang","doi":"10.1109/ICNIDC.2009.5360785","DOIUrl":"https://doi.org/10.1109/ICNIDC.2009.5360785","url":null,"abstract":"When match against Chinese keyword for network content audit, one of the biggest problems is that there is interference of “noise characters”, it makes the traditional way using explicit string pattern to match infeasible. Regular expression matching can solve the problem perfectly, but the DFA-base approaches for regular expression matching will also encounter the problem of excessive memory usage. In this paper, we try to solve the problem encountered when applying regular expression to Chinese network content audit. We propose a regular expression rewriting techniques and grouping principle that can solve excessive memory usage problem in DFA-based approach. Our solution can make it possible to apply regular expression to Chinese network content audit.","PeriodicalId":127306,"journal":{"name":"2009 IEEE International Conference on Network Infrastructure and Digital Content","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132421201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A bi-direction adjustable token bucket mechanism for multi-class bandwidth guarantee and sharing 一种双向可调令牌桶机制,用于多类带宽保障和共享
Pub Date : 2009-12-31 DOI: 10.1109/ICNIDC.2009.5360808
Dazhong He, Wenli Zhou, Xiang Zhang
In enterprises and residential networks, there are always multiple classes of traffic sharing the limited access bandwidth, and multiple token buckets are used to guarantee the usage of every class. At the same time, network managers hope to utilize the idle resource, in case of the bandwidth for some classes is redundant, for higher classes, as well as lower classes. A bi-direction adjustable multi-class token bucket mechanism is presented to achieve this goal. Furthermore, experiments and tests have proved that this solution is effective.
在企业和居民网络中,总是有多个流量类别共享有限的接入带宽,并且使用多个令牌桶来保证每个类别的使用。同时,网络管理员希望利用空闲的资源,以防某些类的带宽冗余,无论是高级类还是低级类。为此,提出了一种双向可调的多类令牌桶机制。通过实验和测试,证明了该方案的有效性。
{"title":"A bi-direction adjustable token bucket mechanism for multi-class bandwidth guarantee and sharing","authors":"Dazhong He, Wenli Zhou, Xiang Zhang","doi":"10.1109/ICNIDC.2009.5360808","DOIUrl":"https://doi.org/10.1109/ICNIDC.2009.5360808","url":null,"abstract":"In enterprises and residential networks, there are always multiple classes of traffic sharing the limited access bandwidth, and multiple token buckets are used to guarantee the usage of every class. At the same time, network managers hope to utilize the idle resource, in case of the bandwidth for some classes is redundant, for higher classes, as well as lower classes. A bi-direction adjustable multi-class token bucket mechanism is presented to achieve this goal. Furthermore, experiments and tests have proved that this solution is effective.","PeriodicalId":127306,"journal":{"name":"2009 IEEE International Conference on Network Infrastructure and Digital Content","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133483732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An improved SEND protocol against DoS attacks in Mobile IPv6 environment 针对移动IPv6环境下DoS攻击的改进SEND协议
Pub Date : 2009-12-31 DOI: 10.1109/ICNIDC.2009.5360962
Meigen Huang, Jianrong Liu, Yunjie Zhou
Neighbor Discovery protocol can be used to communicate between neighboring nodes in the Mobile IPv6 environment. For a secure Neighbor Discovery protocol, the IETF SEND working group standardized a Secure Neighbor Discovery protocol, and a Cryptographically Generated Address protocol. Neighbor Discovery protocol can be provided with secure functions by adding the RSA signature option and the CGA parameter option. But there are still attacks against SEND itself, particularly, Denial-of-Service attacks. Because the CGA verification consumes large amount of computing resources, attackers may forge a large number of attack data packages to make the node run out of resources. To provide the safeguard of Secure Neighbor Discovery protocol in Mobile IPv6 environment, we propose a mechanism that prevent SEND from part of DoS attacks by adding a set message interaction before CGA verification without a certification authority or any security infrastructure.
在移动IPv6环境下,邻居发现协议可以用于相邻节点之间的通信。对于安全邻居发现协议,IETF SEND工作组标准化了安全邻居发现协议和加密生成地址协议。通过增加RSA签名选项和CGA参数选项,可以为邻居发现协议提供安全功能。但是仍然有针对SEND本身的攻击,特别是拒绝服务攻击。由于CGA验证会消耗大量的计算资源,攻击者可能会伪造大量的攻击数据包,导致节点资源耗尽。为了在移动IPv6环境下提供安全邻居发现协议的安全保障,我们提出了一种机制,通过在CGA验证之前添加一组消息交互来防止SEND受到部分DoS攻击,而不需要认证机构或任何安全基础设施。
{"title":"An improved SEND protocol against DoS attacks in Mobile IPv6 environment","authors":"Meigen Huang, Jianrong Liu, Yunjie Zhou","doi":"10.1109/ICNIDC.2009.5360962","DOIUrl":"https://doi.org/10.1109/ICNIDC.2009.5360962","url":null,"abstract":"Neighbor Discovery protocol can be used to communicate between neighboring nodes in the Mobile IPv6 environment. For a secure Neighbor Discovery protocol, the IETF SEND working group standardized a Secure Neighbor Discovery protocol, and a Cryptographically Generated Address protocol. Neighbor Discovery protocol can be provided with secure functions by adding the RSA signature option and the CGA parameter option. But there are still attacks against SEND itself, particularly, Denial-of-Service attacks. Because the CGA verification consumes large amount of computing resources, attackers may forge a large number of attack data packages to make the node run out of resources. To provide the safeguard of Secure Neighbor Discovery protocol in Mobile IPv6 environment, we propose a mechanism that prevent SEND from part of DoS attacks by adding a set message interaction before CGA verification without a certification authority or any security infrastructure.","PeriodicalId":127306,"journal":{"name":"2009 IEEE International Conference on Network Infrastructure and Digital Content","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133172703","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
User behaviors in an Online Social Network 在线社交网络中的用户行为
Pub Date : 2009-12-31 DOI: 10.1109/ICNIDC.2009.5360901
Dan Guo, Fuhong Lin, Changjia Chen
In this paper, we focus on an Online Social Network (OSN), namely “kaixin-net” (www.kaixin001.com) which is one of the biggest OSNs in China. Based on studying the most popular game ‘Buying-a-house’, we investigate user behaviors. First, we made a model for “Buying-a-house”, then using the dataset that we crawled and traced (we crawled about one hundred and fifty user's profiles and traced forty users for about twenty days), we draw the following findings: (1) People who just join the game have much interest in this OSN, actively interact with his friends. (2) The interest goes down according to the time lapse for most of users, but there are also a few players whose interests never go down and enjoy this game very much. These can be interpreted as the population of kaixin-net is growing at the beginning state, but it will decline after the peak comes. So the organizers should think about how to slow down the peak's coming.
本文以中国最大的社交网络之一“开心网”(www.kaixin001.com)为研究对象。在研究最流行的游戏“买房”的基础上,我们调查了用户行为。首先,我们做了一个“买房”的模型,然后使用我们抓取和追踪的数据集(我们抓取了大约150个用户的个人资料,追踪了大约20天的40个用户),我们得出了以下发现:(1)刚加入游戏的人对这个OSN很感兴趣,积极地与他的朋友互动。(2)大多数用户的兴趣会随着时间的推移而下降,但也有少数玩家的兴趣永远不会下降,他们非常喜欢这款游戏。这可以解释为开新网的人口在初始状态是增长的,但在峰值到来后会下降。所以组织者应该考虑如何减缓高峰的到来。
{"title":"User behaviors in an Online Social Network","authors":"Dan Guo, Fuhong Lin, Changjia Chen","doi":"10.1109/ICNIDC.2009.5360901","DOIUrl":"https://doi.org/10.1109/ICNIDC.2009.5360901","url":null,"abstract":"In this paper, we focus on an Online Social Network (OSN), namely “kaixin-net” (www.kaixin001.com) which is one of the biggest OSNs in China. Based on studying the most popular game ‘Buying-a-house’, we investigate user behaviors. First, we made a model for “Buying-a-house”, then using the dataset that we crawled and traced (we crawled about one hundred and fifty user's profiles and traced forty users for about twenty days), we draw the following findings: (1) People who just join the game have much interest in this OSN, actively interact with his friends. (2) The interest goes down according to the time lapse for most of users, but there are also a few players whose interests never go down and enjoy this game very much. These can be interpreted as the population of kaixin-net is growing at the beginning state, but it will decline after the peak comes. So the organizers should think about how to slow down the peak's coming.","PeriodicalId":127306,"journal":{"name":"2009 IEEE International Conference on Network Infrastructure and Digital Content","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133249325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Implementation of Ad Hoc network terminal based on embedded ARM platform 基于嵌入式ARM平台的Ad Hoc网络终端的实现
Pub Date : 2009-12-31 DOI: 10.1109/ICNIDC.2009.5360862
X. Shen, Muqing Wu, Xuefeng Lu, Yan Zhen, Jingfang Su
Ad Hoc network, which is a peer-to-peer wireless network, plays a very important role in military and sensor networks. Although it has great potential usages, there is not much practical use of Ad Hoc network at present due to various problems in several aspects. A robust convenient mobile device is one of the problems. This paper implements an ad hoc network platform through constructing an embedded ARM hardware platform and transplanting corresponding Ad Hoc protocol onto it. Our tests show that the platform we developed has realized the function of the Ad Hoc network successfully. Finally, we give some performance evaluation of this platform and propose possible solutions to improve it.
Ad Hoc网络是一种点对点无线网络,在军事和传感器网络中起着非常重要的作用。Ad Hoc网络虽然具有很大的潜在用途,但由于存在多方面的问题,目前实际应用并不多。一个强大的方便的移动设备是问题之一。本文通过构建嵌入式ARM硬件平台,并在其上移植相应的ad hoc协议,实现了一个ad hoc网络平台。测试表明,我们开发的平台成功地实现了Ad Hoc网络的功能。最后,对该平台进行了性能评价,并提出了可能的改进方案。
{"title":"Implementation of Ad Hoc network terminal based on embedded ARM platform","authors":"X. Shen, Muqing Wu, Xuefeng Lu, Yan Zhen, Jingfang Su","doi":"10.1109/ICNIDC.2009.5360862","DOIUrl":"https://doi.org/10.1109/ICNIDC.2009.5360862","url":null,"abstract":"Ad Hoc network, which is a peer-to-peer wireless network, plays a very important role in military and sensor networks. Although it has great potential usages, there is not much practical use of Ad Hoc network at present due to various problems in several aspects. A robust convenient mobile device is one of the problems. This paper implements an ad hoc network platform through constructing an embedded ARM hardware platform and transplanting corresponding Ad Hoc protocol onto it. Our tests show that the platform we developed has realized the function of the Ad Hoc network successfully. Finally, we give some performance evaluation of this platform and propose possible solutions to improve it.","PeriodicalId":127306,"journal":{"name":"2009 IEEE International Conference on Network Infrastructure and Digital Content","volume":"634 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127643678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Research and design of data preprocessing of wireless sensor networks based on Multi-Agents 基于多智能体的无线传感器网络数据预处理研究与设计
Pub Date : 2009-12-31 DOI: 10.1109/ICNIDC.2009.5360973
Ming Xu
In view of the difficulty for nodes to renew the power and the structure of the wireless sensor networks, this paper presents a model of the data preprocessing of wireless sensor networks based on multi-agents by means of utilizing independent and intelligent of Multi-Agents. Then this paper introduces the structure of model and every Agent's function and trait. Moreover, the model also presents the algorithm to accomplish data preprocessing and avoids the error of the data collection. Thus this model could help to reduce the energy consumption attribute to communication between the nodes and enhance the effectiveness of data transmission.
针对无线传感器网络中节点能量更新困难和网络结构复杂的问题,利用多智能体的独立性和智能性,提出了一种基于多智能体的无线传感器网络数据预处理模型。然后介绍了模型的结构以及每个Agent的功能和特征。此外,该模型还给出了完成数据预处理的算法,避免了数据采集的误差。因此,该模型有助于降低节点间通信的能耗属性,提高数据传输的有效性。
{"title":"Research and design of data preprocessing of wireless sensor networks based on Multi-Agents","authors":"Ming Xu","doi":"10.1109/ICNIDC.2009.5360973","DOIUrl":"https://doi.org/10.1109/ICNIDC.2009.5360973","url":null,"abstract":"In view of the difficulty for nodes to renew the power and the structure of the wireless sensor networks, this paper presents a model of the data preprocessing of wireless sensor networks based on multi-agents by means of utilizing independent and intelligent of Multi-Agents. Then this paper introduces the structure of model and every Agent's function and trait. Moreover, the model also presents the algorithm to accomplish data preprocessing and avoids the error of the data collection. Thus this model could help to reduce the energy consumption attribute to communication between the nodes and enhance the effectiveness of data transmission.","PeriodicalId":127306,"journal":{"name":"2009 IEEE International Conference on Network Infrastructure and Digital Content","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115602128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Distributed data transport service implement strategy in optical grid 分布式数据传输业务在光网格中的实现策略
Pub Date : 2009-12-31 DOI: 10.1109/ICNIDC.2009.5360834
Runze Wu, Xingqin Jiao, Dachuan Qu, Yuefeng Ji
A distributed data transport service implementing strategy is proposed to support grid network service with dynamic optical resource provisioning. The distributed data transport provides grid user with dynamic lightpaths. The test bed circling the resource managing and scheduling mechanism is built on the base of Globus Tookit 4. Optical grid middleware is developed to achieve grid network service, combining GridFTP and GMPLS network control, supporting network resource discovering, management and reservation. Also, the big-bulk data transport application spreads on the test bed with parallel lightpaths with the distributed and parallel transporting for the different data slices.
提出了一种分布式数据传输服务实现策略,以支持具有动态光资源配置的网格网络服务。分布式数据传输为网格用户提供了动态光路。基于Globus Tookit 4构建了围绕资源管理和调度机制的测试平台。为了实现网格网络服务,开发了光网格中间件,将GridFTP和GMPLS网络控制相结合,支持网络资源的发现、管理和预留。同时,采用并行光路对不同数据片进行分布式并行传输,实现了大容量数据传输应用在试验台上的扩展。
{"title":"Distributed data transport service implement strategy in optical grid","authors":"Runze Wu, Xingqin Jiao, Dachuan Qu, Yuefeng Ji","doi":"10.1109/ICNIDC.2009.5360834","DOIUrl":"https://doi.org/10.1109/ICNIDC.2009.5360834","url":null,"abstract":"A distributed data transport service implementing strategy is proposed to support grid network service with dynamic optical resource provisioning. The distributed data transport provides grid user with dynamic lightpaths. The test bed circling the resource managing and scheduling mechanism is built on the base of Globus Tookit 4. Optical grid middleware is developed to achieve grid network service, combining GridFTP and GMPLS network control, supporting network resource discovering, management and reservation. Also, the big-bulk data transport application spreads on the test bed with parallel lightpaths with the distributed and parallel transporting for the different data slices.","PeriodicalId":127306,"journal":{"name":"2009 IEEE International Conference on Network Infrastructure and Digital Content","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115802400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
2009 IEEE International Conference on Network Infrastructure and Digital Content
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1