首页 > 最新文献

Seventh International Conference on Networking (icn 2008)最新文献

英文 中文
Main Memory Commit Protocols for Multiple Backups 多备份的主内存提交协议
Pub Date : 2008-04-13 DOI: 10.1109/ICN.2008.39
Heine Kolltveit, Svein-Olaf Hvasshovd
Atomic commitment protocols are needed to preserve ACID properties of distributed transactional systems. The performance of such protocols is essential to avoid adding too much overhead to transaction processing. Also, many applications require levels of availability, which cannot be met by using only one backup source (disk or process). Combining these two requirements, this paper presents protocols for use with main memory primary-backup systems, where there are multiple backup processes for each primary. These protocols are evaluated by simulation and verified by statistical analysis. The results show that the best choice of protocol is not static, but varies with the transactional load of the system.
需要原子提交协议来保持分布式事务系统的ACID属性。这些协议的性能对于避免给事务处理增加过多的开销至关重要。此外,许多应用程序需要不同级别的可用性,而仅使用一个备份源(磁盘或进程)是无法满足这些要求的。结合这两个需求,本文提出了用于主存主备份系统的协议,其中每个主系统有多个备份进程。通过仿真和统计分析对这些方案进行了评价和验证。结果表明,协议的最佳选择不是静态的,而是随着系统事务负载的变化而变化的。
{"title":"Main Memory Commit Protocols for Multiple Backups","authors":"Heine Kolltveit, Svein-Olaf Hvasshovd","doi":"10.1109/ICN.2008.39","DOIUrl":"https://doi.org/10.1109/ICN.2008.39","url":null,"abstract":"Atomic commitment protocols are needed to preserve ACID properties of distributed transactional systems. The performance of such protocols is essential to avoid adding too much overhead to transaction processing. Also, many applications require levels of availability, which cannot be met by using only one backup source (disk or process). Combining these two requirements, this paper presents protocols for use with main memory primary-backup systems, where there are multiple backup processes for each primary. These protocols are evaluated by simulation and verified by statistical analysis. The results show that the best choice of protocol is not static, but varies with the transactional load of the system.","PeriodicalId":250085,"journal":{"name":"Seventh International Conference on Networking (icn 2008)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126365942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
XML Based 3G/LTE Network and Service Management Concept 基于XML的3G/LTE网络与业务管理概念
Pub Date : 2008-04-13 DOI: 10.1109/ICN.2008.23
E. Wallenius, T. Hämäläinen, Kari Halttunen
This paper describes a new way of implementing converged wireless network and service management system using XML as the management message language and SOAP/HTTP as the protocols for configuration, performance, fault and alarm communication between network operation and maitenance (O&M) system and network elements (NE) and service provider's service production systems. Principles described in this article are fully tested and applicable and can be exploited in any current network and service management system.
本文介绍了一种以XML作为管理消息语言,以SOAP/HTTP作为网络运维系统与网元、服务提供商的业务生产系统之间的配置、性能、故障和告警通信协议,实现无线网络与业务融合管理系统的新方法。本文描述的原理经过了充分的测试和应用,可以在任何当前的网络和业务管理系统中使用。
{"title":"XML Based 3G/LTE Network and Service Management Concept","authors":"E. Wallenius, T. Hämäläinen, Kari Halttunen","doi":"10.1109/ICN.2008.23","DOIUrl":"https://doi.org/10.1109/ICN.2008.23","url":null,"abstract":"This paper describes a new way of implementing converged wireless network and service management system using XML as the management message language and SOAP/HTTP as the protocols for configuration, performance, fault and alarm communication between network operation and maitenance (O&M) system and network elements (NE) and service provider's service production systems. Principles described in this article are fully tested and applicable and can be exploited in any current network and service management system.","PeriodicalId":250085,"journal":{"name":"Seventh International Conference on Networking (icn 2008)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121396630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improving the Sustainability of Autonomous Systems 提高自治系统的可持续性
Pub Date : 2008-04-13 DOI: 10.1109/ICN.2008.24
M. Watari, Y. Hei, S. Ano, K. Yamazaki
The border gateway protocol (BGP) routing system is one of the key components of today's Internet infrastructure. However, the fundamentals of the BGP routing system have remained unchanged since its standardization. The only fault tolerant mechanism currently available is multihoming, which is about increasing the number of peering autonomous systems (ASes). The reliability of the BGP infrastructure is highly dependent on the statically configured links provided by multihoming, and recovery from larger failures requires cooperation among operators in both parties. Such manual process is problematic, especially during disasters, as it severely delays recovery. As a solution to the problem, this paper proposes a novel on-demand BGP peering method to offer ASes the ability to autonomously and dynamically recover from failures. We introduce a new peering model where peering is established only upon failures. These peers are discovered dynamically and peering is established without any prior configuration. Through evaluation using a prototype implementation, the proposed on-demand BGP peering method provided recovery within 3 seconds of the time of the BGP hold timer expiration. The method is designed to ensure applicability to current ASes with flexibility and adaptability to various failures, contributing toward improving the sustainability of ASes.
边界网关协议(BGP)路由系统是当今互联网基础设施的关键组成部分之一。但是,BGP路由系统的基本原理在标准化后没有改变。目前唯一可用的容错机制是多宿主,它是关于增加对等自治系统(对等自治系统)的数量。BGP基础设施的可靠性高度依赖于多归属所提供的静态配置链路,较大故障的恢复需要双方运营商的合作。这种手动过程是有问题的,特别是在灾难期间,因为它严重延迟了恢复。为了解决这一问题,本文提出了一种新颖的按需BGP对等方法,使As能够自动动态地从故障中恢复。我们引入了一种新的对等模型,在这种模型中,只有在发生故障时才建立对等。这些对等体是动态发现的,无需事先配置即可建立对等体。通过对一个原型实现的评估,提出的按需BGP对等方法可以在BGP保持定时器到期后3秒内恢复。该方法的目的是确保应用于现有的应用系统,具有灵活性和对各种故障的适应性,有助于提高应用系统的可持续性。
{"title":"Improving the Sustainability of Autonomous Systems","authors":"M. Watari, Y. Hei, S. Ano, K. Yamazaki","doi":"10.1109/ICN.2008.24","DOIUrl":"https://doi.org/10.1109/ICN.2008.24","url":null,"abstract":"The border gateway protocol (BGP) routing system is one of the key components of today's Internet infrastructure. However, the fundamentals of the BGP routing system have remained unchanged since its standardization. The only fault tolerant mechanism currently available is multihoming, which is about increasing the number of peering autonomous systems (ASes). The reliability of the BGP infrastructure is highly dependent on the statically configured links provided by multihoming, and recovery from larger failures requires cooperation among operators in both parties. Such manual process is problematic, especially during disasters, as it severely delays recovery. As a solution to the problem, this paper proposes a novel on-demand BGP peering method to offer ASes the ability to autonomously and dynamically recover from failures. We introduce a new peering model where peering is established only upon failures. These peers are discovered dynamically and peering is established without any prior configuration. Through evaluation using a prototype implementation, the proposed on-demand BGP peering method provided recovery within 3 seconds of the time of the BGP hold timer expiration. The method is designed to ensure applicability to current ASes with flexibility and adaptability to various failures, contributing toward improving the sustainability of ASes.","PeriodicalId":250085,"journal":{"name":"Seventh International Conference on Networking (icn 2008)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127383277","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Adapting Constant Modulus Algorithm for Phase Modulation Signals 相位调制信号的自适应恒模算法
Pub Date : 2008-04-13 DOI: 10.1109/ICN.2008.11
Xin Wang, G. Feng
A novel blind constant modulus algorithm (CMA) for phase modulation signals is proposed. Compared with the CMAs before, this method, which exploits the relative phase information concealed in the M-PSK signals, has the ability to detect the types of modulation without the training information. Furthermore, this idea can apply to the continuous-varying modulation scheme systems. With the detected modulation scheme, the received signals can be recovered correctly. Simulation results prove the superiority of this new method.
提出了一种新的相位调制信号盲恒模算法。与之前的CMAs相比,该方法利用了隐藏在M-PSK信号中的相对相位信息,能够在不需要训练信息的情况下检测调制类型。此外,该思想也适用于连续变调制方案系统。通过检测到的调制方案,可以正确地恢复接收到的信号。仿真结果证明了该方法的优越性。
{"title":"Adapting Constant Modulus Algorithm for Phase Modulation Signals","authors":"Xin Wang, G. Feng","doi":"10.1109/ICN.2008.11","DOIUrl":"https://doi.org/10.1109/ICN.2008.11","url":null,"abstract":"A novel blind constant modulus algorithm (CMA) for phase modulation signals is proposed. Compared with the CMAs before, this method, which exploits the relative phase information concealed in the M-PSK signals, has the ability to detect the types of modulation without the training information. Furthermore, this idea can apply to the continuous-varying modulation scheme systems. With the detected modulation scheme, the received signals can be recovered correctly. Simulation results prove the superiority of this new method.","PeriodicalId":250085,"journal":{"name":"Seventh International Conference on Networking (icn 2008)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116578135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Fast Reservation Protocols for Latency Reduction in Optical Burst-Switched Networks Based on Predictions 基于预测的减少光突发交换网络延迟的快速保留协议
Pub Date : 2008-04-13 DOI: 10.1109/ICN.2008.90
Kyriaki Seklou, Emmanouel Varvarigos
We propose and evaluate fast reservation (FR) protocols for optical burst switched (OBS) networks. The proposed reservation schemes aim at reducing the end-to-end delay of a data burst, by sending the burst header packet (BHP) in the core network before the burst assembly is completed at the ingress node. We use linear prediction filters to estimate the expected length of the burst and the time needed for the burstification process to complete. A BHP packet carrying these estimates is sent before burst completion, in order to reserve bandwidth at each intermediate node for the time interval the burst is expected to pass from that node. Reducing the total time needed for a packet to be transported over an OBS network is important, especially for real-time applications. Reserving bandwidth only for the time interval it is actual going to be used by a burst is important for network utilization efficiency. In the simulations conducted we evaluate the proposed extensions and prove their usefulness.
我们提出并评估了用于光突发交换(OBS)网络的快速保留(FR)协议。提出的保留方案旨在减少数据突发的端到端延迟,通过在入口节点完成突发集合之前在核心网络中发送突发头包(BHP)。我们使用线性预测滤波器来估计爆发的预期长度和完成爆发过程所需的时间。在突发完成之前发送一个携带这些估计值的BHP包,以便在每个中间节点为预期突发从该节点通过的时间间隔保留带宽。减少通过OBS网络传输数据包所需的总时间非常重要,特别是对于实时应用程序。仅为突发事件实际使用的时间间隔保留带宽对网络利用效率很重要。在进行的仿真中,我们评估了所提出的扩展并证明了它们的有效性。
{"title":"Fast Reservation Protocols for Latency Reduction in Optical Burst-Switched Networks Based on Predictions","authors":"Kyriaki Seklou, Emmanouel Varvarigos","doi":"10.1109/ICN.2008.90","DOIUrl":"https://doi.org/10.1109/ICN.2008.90","url":null,"abstract":"We propose and evaluate fast reservation (FR) protocols for optical burst switched (OBS) networks. The proposed reservation schemes aim at reducing the end-to-end delay of a data burst, by sending the burst header packet (BHP) in the core network before the burst assembly is completed at the ingress node. We use linear prediction filters to estimate the expected length of the burst and the time needed for the burstification process to complete. A BHP packet carrying these estimates is sent before burst completion, in order to reserve bandwidth at each intermediate node for the time interval the burst is expected to pass from that node. Reducing the total time needed for a packet to be transported over an OBS network is important, especially for real-time applications. Reserving bandwidth only for the time interval it is actual going to be used by a burst is important for network utilization efficiency. In the simulations conducted we evaluate the proposed extensions and prove their usefulness.","PeriodicalId":250085,"journal":{"name":"Seventh International Conference on Networking (icn 2008)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134364642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
TCP Flows in Stochastic Network Environment: Models and Characteristics 随机网络环境下的TCP流:模型与特征
Pub Date : 2008-04-13 DOI: 10.1109/ICN.2008.101
V. Zaborovsky, Sergey Ygorov, Nikolay Fedorov
The models of network control and resource management in stochastic environment are of great importance. The choice of models and methods depends on adequacy of identification and real measurements of traffic characteristics. Without robust theoretical preconditions network environment modeling will fail to simple simulation results. Therefore Internet as environment of control which is characterized by specific features including dynamism, hierarchy and adaptability is a topic of active fundamental researches. In the paper we consider Internet properties which can be presented by dynamic TCP model and stochastic character of observable fluctuations. Proposed approach is based on the analysis of experimental results, modeling, and analytical approximation of distribution function of stochastic intervals between fast recovery TCP phases.
随机环境下的网络控制和资源管理模型具有重要的意义。模型和方法的选择取决于对交通特征的充分识别和实际测量。如果没有强大的理论前提,网络环境建模将无法得到简单的仿真结果。因此,互联网作为具有动态性、层次性和适应性等特征的控制环境,是一个活跃的基础研究课题。本文考虑了可以用动态TCP模型和可观测波动的随机特征来表示的互联网特性。该方法基于对实验结果的分析、建模和快速恢复TCP相位间随机间隔分布函数的解析逼近。
{"title":"TCP Flows in Stochastic Network Environment: Models and Characteristics","authors":"V. Zaborovsky, Sergey Ygorov, Nikolay Fedorov","doi":"10.1109/ICN.2008.101","DOIUrl":"https://doi.org/10.1109/ICN.2008.101","url":null,"abstract":"The models of network control and resource management in stochastic environment are of great importance. The choice of models and methods depends on adequacy of identification and real measurements of traffic characteristics. Without robust theoretical preconditions network environment modeling will fail to simple simulation results. Therefore Internet as environment of control which is characterized by specific features including dynamism, hierarchy and adaptability is a topic of active fundamental researches. In the paper we consider Internet properties which can be presented by dynamic TCP model and stochastic character of observable fluctuations. Proposed approach is based on the analysis of experimental results, modeling, and analytical approximation of distribution function of stochastic intervals between fast recovery TCP phases.","PeriodicalId":250085,"journal":{"name":"Seventh International Conference on Networking (icn 2008)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133418290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Large Scale Deployment a Mobile Agent Approach to Network Management 大规模部署移动代理网络管理方法
Pub Date : 2008-04-13 DOI: 10.1109/ICN.2008.28
G. Autran, Xining Li
In this paper, we describe a possible approach for using mobile agents to manage a group of networked devices. Our system goes one step further from the traditional one-to- one device management setting by providing a one-to-many architecture able to perform simple administrative tasks on behalf of the user. We show how the use of mobile agents eases the task of maintaining, monitoring and managing a very large number of devices and consequently, reduces the work load of the people in charge of these devices.
在本文中,我们描述了一种使用移动代理来管理一组联网设备的可能方法。我们的系统比传统的一对一设备管理设置更进一步,提供了一个一对多的架构,能够代表用户执行简单的管理任务。我们将展示使用移动代理如何简化维护、监视和管理大量设备的任务,从而减少负责这些设备的人员的工作量。
{"title":"Large Scale Deployment a Mobile Agent Approach to Network Management","authors":"G. Autran, Xining Li","doi":"10.1109/ICN.2008.28","DOIUrl":"https://doi.org/10.1109/ICN.2008.28","url":null,"abstract":"In this paper, we describe a possible approach for using mobile agents to manage a group of networked devices. Our system goes one step further from the traditional one-to- one device management setting by providing a one-to-many architecture able to perform simple administrative tasks on behalf of the user. We show how the use of mobile agents eases the task of maintaining, monitoring and managing a very large number of devices and consequently, reduces the work load of the people in charge of these devices.","PeriodicalId":250085,"journal":{"name":"Seventh International Conference on Networking (icn 2008)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122682450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Experimental Evaluation and Characterization of Long-Distance 802.11g Links 远距离802.11g链路的实验评估与特性研究
Pub Date : 2008-04-13 DOI: 10.1109/ICN.2008.32
H. El-Sayed, S. Zeadally, M. Boulmalf
The use of 802.11 long-distance links is a cost-effective means of providing wireless connectivity to rural areas. Although deployments in such settings are increasing, there are few empirical results reported on the performance of 802.11 over long distances. An empirical evaluation of 802.11 performance over long distances is a non-trivial task since it involves several variables such as the network topology, tower heights, antenna types used and their orientations, and radio transmit powers. The task is further complicated by the presence of network performance constraints, and the inter-dependence among the variables. In this paper we present an empirical performance study of long-distance 802.11g links using metrics such as signal strength, free space loss, jitter and round-trip time. In addition, we also develop a theoretical model of the wireless link to validate our experimental measurements.
使用802.11长途链路是向农村地区提供无线连接的一种经济有效的方法。尽管在这种环境中的部署正在增加,但很少有关于802.11长距离性能的实证结果报告。对远距离802.11性能的经验评估是一项非常重要的任务,因为它涉及几个变量,如网络拓扑结构、塔高度、所使用的天线类型及其方向以及无线电发射功率。由于存在网络性能约束和变量之间的相互依赖性,任务变得更加复杂。在本文中,我们使用信号强度、自由空间损失、抖动和往返时间等指标对远距离802.11g链路进行了实证性能研究。此外,我们还开发了无线链路的理论模型来验证我们的实验测量。
{"title":"Experimental Evaluation and Characterization of Long-Distance 802.11g Links","authors":"H. El-Sayed, S. Zeadally, M. Boulmalf","doi":"10.1109/ICN.2008.32","DOIUrl":"https://doi.org/10.1109/ICN.2008.32","url":null,"abstract":"The use of 802.11 long-distance links is a cost-effective means of providing wireless connectivity to rural areas. Although deployments in such settings are increasing, there are few empirical results reported on the performance of 802.11 over long distances. An empirical evaluation of 802.11 performance over long distances is a non-trivial task since it involves several variables such as the network topology, tower heights, antenna types used and their orientations, and radio transmit powers. The task is further complicated by the presence of network performance constraints, and the inter-dependence among the variables. In this paper we present an empirical performance study of long-distance 802.11g links using metrics such as signal strength, free space loss, jitter and round-trip time. In addition, we also develop a theoretical model of the wireless link to validate our experimental measurements.","PeriodicalId":250085,"journal":{"name":"Seventh International Conference on Networking (icn 2008)","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124429548","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
MRSI: A Fast Pattern Matching Algorithm for Anti-virus Applications 核磁共振成像:反病毒应用的快速模式匹配算法
Pub Date : 2008-04-13 DOI: 10.1109/ICN.2008.119
Xin Zhou, Bosheng Xu, Yaxuan Qi, Jun Li
Anti-virus applications play an important role in today's Internet communication security. Virus scanning is usually performed on email, Web and file transfer traffic flows at intranet security gateways. The performance of popular anti-virus applications relies on the pattern matching algorithms implemented in these security devices. The growth of network bandwidth and the increase of virus signatures call for high speed and scalable pattern matching algorithms. Motivated by several observations of a real-life virus signature database from Clam-AV, a popular antivirus application, a fast pattern matching algorithm named MRSI is proposed in this paper. Compared to the current algorithm implemented in Clam-AV, MRSI achieved an 80%~100% faster virus scanning speed without excessive memory usages.
防病毒应用程序在当今互联网通信安全中发挥着重要作用。病毒扫描通常在内网安全网关对电子邮件、Web和文件传输流量进行扫描。流行的反病毒应用程序的性能依赖于这些安全设备中实现的模式匹配算法。随着网络带宽的增长和病毒特征的增加,对高速、可扩展的模式匹配算法提出了更高的要求。基于对流行的杀毒软件Clam-AV中真实病毒特征库的观察,提出了一种快速模式匹配算法——MRSI算法。与目前在Clam-AV中实现的算法相比,MRSI的病毒扫描速度提高了80%~100%,而不会占用过多的内存。
{"title":"MRSI: A Fast Pattern Matching Algorithm for Anti-virus Applications","authors":"Xin Zhou, Bosheng Xu, Yaxuan Qi, Jun Li","doi":"10.1109/ICN.2008.119","DOIUrl":"https://doi.org/10.1109/ICN.2008.119","url":null,"abstract":"Anti-virus applications play an important role in today's Internet communication security. Virus scanning is usually performed on email, Web and file transfer traffic flows at intranet security gateways. The performance of popular anti-virus applications relies on the pattern matching algorithms implemented in these security devices. The growth of network bandwidth and the increase of virus signatures call for high speed and scalable pattern matching algorithms. Motivated by several observations of a real-life virus signature database from Clam-AV, a popular antivirus application, a fast pattern matching algorithm named MRSI is proposed in this paper. Compared to the current algorithm implemented in Clam-AV, MRSI achieved an 80%~100% faster virus scanning speed without excessive memory usages.","PeriodicalId":250085,"journal":{"name":"Seventh International Conference on Networking (icn 2008)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128606871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
New Approach to Converged Networks 融合网络的新方法
Pub Date : 2008-04-13 DOI: 10.1109/ICN.2008.127
V. Skorpil
This paper describes a new approach to converged communication and computer networks. It was designed a new architecture of nodal active network element that is powerful enough and supports priority processing of different types of connection. It is exactly the missing support of priority processing that constitutes the greatest drawback of the majority of present-day active network elements. The proposed new architecture is based on the technology of artificial neural networks. Neural networks are used to optimize switching input requirements to outputs. This paper also describes design and computer simulations of a new architecture network element, based on artificial neural network technology with the support of priority processing for different connection types. As an example of a network element was selected switching area. This network element with optimized switching area is able to transfer large data quantity with minimum delay. Architecture of network element, that contains artificial neural network for optimized priority switching is described in this paper. It describes implementation of neural network in control process for data units switching. The programming language MATLAB 7.0 was used for software simulation. Network elements with new architecture, which uses a neural network, as well as intimated simulation, are suitable for working for example in personal wireless network communication systems.
本文介绍了一种融合通信与计算机网络的新方法。设计了一种功能强大、支持不同类型连接优先处理的节点主动网元新体系结构。正是缺少对优先级处理的支持,构成了当前大多数活动网络元素的最大缺点。提出的新架构是基于人工神经网络技术的。神经网络用于优化输入到输出的切换要求。本文还介绍了一种基于人工神经网络技术,支持对不同连接类型进行优先处理的新型体系结构网络元的设计和计算机仿真。作为一个网元的例子,选择了交换区域。该网元具有优化的交换区域,能够以最小的延迟传输大数据量。本文描述了网络单元的结构,其中包含了用于优化优先级交换的人工神经网络。介绍了神经网络在数据单元交换控制过程中的实现。采用MATLAB 7.0编程语言进行软件仿真。采用神经网络和仿真技术的新型网络元件,适用于个人无线网络通信系统等。
{"title":"New Approach to Converged Networks","authors":"V. Skorpil","doi":"10.1109/ICN.2008.127","DOIUrl":"https://doi.org/10.1109/ICN.2008.127","url":null,"abstract":"This paper describes a new approach to converged communication and computer networks. It was designed a new architecture of nodal active network element that is powerful enough and supports priority processing of different types of connection. It is exactly the missing support of priority processing that constitutes the greatest drawback of the majority of present-day active network elements. The proposed new architecture is based on the technology of artificial neural networks. Neural networks are used to optimize switching input requirements to outputs. This paper also describes design and computer simulations of a new architecture network element, based on artificial neural network technology with the support of priority processing for different connection types. As an example of a network element was selected switching area. This network element with optimized switching area is able to transfer large data quantity with minimum delay. Architecture of network element, that contains artificial neural network for optimized priority switching is described in this paper. It describes implementation of neural network in control process for data units switching. The programming language MATLAB 7.0 was used for software simulation. Network elements with new architecture, which uses a neural network, as well as intimated simulation, are suitable for working for example in personal wireless network communication systems.","PeriodicalId":250085,"journal":{"name":"Seventh International Conference on Networking (icn 2008)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-04-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116692480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
Seventh International Conference on Networking (icn 2008)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1