首页 > 最新文献

Proceedings of the 2nd International Conference on Industrial Control Network And System Engineering Research最新文献

英文 中文
Research on Construction Method of Power Grid Topology Integration Based on IEC 61970 CIM 基于IEC 61970 CIM的电网拓扑集成构建方法研究
Jiran Zhu, Peng Liu, Guoqing Wang, Yiming Lu, Di Zhang, Xianguo Kang, Liming Wang, Sumei Guo
It introduces configuration and implementation method of integrated technology between transmission network model and distribution network model for Chinese power grid based on IEC 61970 series standards in this paper. It contains the transmission network model of CIM/E format is extracted from the business system in security zone of production & control, the distribution network model of CIM/XML format is extracted from the business system in security zone of management & information. It gives a method to translate the model format from CIM/E to CIM/XML, and then finish the technology verification. It achieves integrated and completed grid model from high voltage to low voltage at last. All of the above, it provides a technology program to get completed map of power grid.
介绍了基于IEC 61970系列标准的中国电网输配网模型集成技术的配置和实现方法。其中包括从生产控制安全区域的业务系统中提取的CIM/E格式的传输网络模型,从管理信息安全区域的业务系统中提取的CIM/XML格式的分配网络模型。给出了一种将模型格式从CIM/E转换为CIM/XML的方法,并进行了技术验证。最终实现了从高压到低压的完整的电网模型。为绘制完整的电网图提供了技术方案。
{"title":"Research on Construction Method of Power Grid Topology Integration Based on IEC 61970 CIM","authors":"Jiran Zhu, Peng Liu, Guoqing Wang, Yiming Lu, Di Zhang, Xianguo Kang, Liming Wang, Sumei Guo","doi":"10.1145/3411016.3411159","DOIUrl":"https://doi.org/10.1145/3411016.3411159","url":null,"abstract":"It introduces configuration and implementation method of integrated technology between transmission network model and distribution network model for Chinese power grid based on IEC 61970 series standards in this paper. It contains the transmission network model of CIM/E format is extracted from the business system in security zone of production & control, the distribution network model of CIM/XML format is extracted from the business system in security zone of management & information. It gives a method to translate the model format from CIM/E to CIM/XML, and then finish the technology verification. It achieves integrated and completed grid model from high voltage to low voltage at last. All of the above, it provides a technology program to get completed map of power grid.","PeriodicalId":251897,"journal":{"name":"Proceedings of the 2nd International Conference on Industrial Control Network And System Engineering Research","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128448919","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and Implementation of Grain Traceability Code Coding Scheme 粮食溯源码编码方案的设计与实现
Miaolei Deng, Pan Feng
Aiming at the problem of low traceability accuracy in the existing grain traceability system due to the bulk of the grain, combined with the GTIN coding standard in the GS1 system, a stage traceability code is set for each link of the grain supply chain to achieve positioning to specific links. Aiming at the problems of long length, low security, and confusing expression and format after encryption of existing traceability code, based on the designed stage traceability code, combined with the improved PRESENT encryption algorithm and format-preserving algorithm to encrypt, We obtained a sixteen-digit final traceability code and tested the coding scheme proposed in this paper, The test results show that the proposed scheme is effective and valuable.
针对现有粮食溯源系统中由于粮食体积大导致溯源精度不高的问题,结合GS1系统中GTIN编码标准,为粮食供应链的各个环节设置阶段性溯源码,实现对具体环节的定位。针对现有的可追溯码存在长度长、安全性低、加密后表达格式混乱等问题,在设计的阶段可追溯码的基础上,结合改进的PRESENT加密算法和保格式算法进行加密,得到了一个16位的最终可追溯码,并对本文提出的编码方案进行了测试,测试结果表明本文提出的方案是有效的、有价值的。
{"title":"Design and Implementation of Grain Traceability Code Coding Scheme","authors":"Miaolei Deng, Pan Feng","doi":"10.1145/3411016.3411018","DOIUrl":"https://doi.org/10.1145/3411016.3411018","url":null,"abstract":"Aiming at the problem of low traceability accuracy in the existing grain traceability system due to the bulk of the grain, combined with the GTIN coding standard in the GS1 system, a stage traceability code is set for each link of the grain supply chain to achieve positioning to specific links. Aiming at the problems of long length, low security, and confusing expression and format after encryption of existing traceability code, based on the designed stage traceability code, combined with the improved PRESENT encryption algorithm and format-preserving algorithm to encrypt, We obtained a sixteen-digit final traceability code and tested the coding scheme proposed in this paper, The test results show that the proposed scheme is effective and valuable.","PeriodicalId":251897,"journal":{"name":"Proceedings of the 2nd International Conference on Industrial Control Network And System Engineering Research","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115588014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Staging Blockchain Technology In The Customer's Journey Through Service Design: A Bike-sharing Case Study To Improve Quality And Trust Perception 通过服务设计将区块链技术应用于客户的旅程:以共享单车为例,提高质量和信任感
Evelyn Durugy, Oussama Darouichi, E. Fragnière
Thanks to the growing trend of the sharing economy and the increased need for innovative mobility solutions, the bike sharing sector has gained considerable importance. However, the privacy of the participants is at risk as their user and travel profiles are not only collected and used by bike sharing service providers. In addition, for the bike share provider, problems have arisen due to increased vandalism and theft of the vehicles on offer. Therefore, this experimental study shows why Blockchain could solve this problem by eliminating dependency on third parties and allowing an economical and user-friendly mode of transport between participants directly. As part of this research, we have "staged" the blockchain through service design in the context of bike sharing. Blockchain will only demonstrate its value when integrated into real service experiences. Our main conclusion is that "blockchain staging" is more important than the technological dimension of smart contracts.
由于共享经济的增长趋势和对创新移动解决方案的需求增加,共享单车行业变得相当重要。然而,参与者的隐私受到威胁,因为他们的用户和旅行资料不仅被共享单车服务提供商收集和使用。此外,对于共享单车供应商来说,由于提供的车辆遭到破坏和盗窃的情况越来越多,问题也出现了。因此,这项实验研究表明,为什么区块链可以通过消除对第三方的依赖,并允许参与者之间直接的经济和用户友好的运输方式来解决这个问题。作为这项研究的一部分,我们在共享单车的背景下,通过服务设计“上演”了区块链。区块链只有融入到真实的服务体验中,才能展现其价值。我们的主要结论是,“区块链分期”比智能合约的技术维度更重要。
{"title":"Staging Blockchain Technology In The Customer's Journey Through Service Design: A Bike-sharing Case Study To Improve Quality And Trust Perception","authors":"Evelyn Durugy, Oussama Darouichi, E. Fragnière","doi":"10.1145/3411016.3411161","DOIUrl":"https://doi.org/10.1145/3411016.3411161","url":null,"abstract":"Thanks to the growing trend of the sharing economy and the increased need for innovative mobility solutions, the bike sharing sector has gained considerable importance. However, the privacy of the participants is at risk as their user and travel profiles are not only collected and used by bike sharing service providers. In addition, for the bike share provider, problems have arisen due to increased vandalism and theft of the vehicles on offer. Therefore, this experimental study shows why Blockchain could solve this problem by eliminating dependency on third parties and allowing an economical and user-friendly mode of transport between participants directly. As part of this research, we have \"staged\" the blockchain through service design in the context of bike sharing. Blockchain will only demonstrate its value when integrated into real service experiences. Our main conclusion is that \"blockchain staging\" is more important than the technological dimension of smart contracts.","PeriodicalId":251897,"journal":{"name":"Proceedings of the 2nd International Conference on Industrial Control Network And System Engineering Research","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125494732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Metric Learning with Neural Network for Modbus/TCP Anomaly Detection 基于神经网络度量学习的Modbus/TCP异常检测
Haicheng Qu, Jianzhong Zhou, Jitao Qin
In cyber security field, anomaly detection is triggered when detected network data traffic behaves obviously differently from normal data traffic. Traditional approaches typically create or define the normal pattern for the data and compare the normal pattern with the detected object. When a significantly different object appears, it is regarded as abnormal data. This paper proposes a novel neural network structure for anomaly detection, called a metric learning network, which aims to directly learn the differences between abnormal and normal data rather than set up a normal pattern. The network comprises an auto-encoder, which is used to encode the abnormal and normal data, and a metric learning component, which is designed to understand the difference between abnormal and normal data via a comparison approach. A deviation score is produced by the metric learning component to recognize the detected object. Research based on the Modbus/Transmission Control Protocol (TCP) network demonstrates that this approach can not only learn the difference between normal data and outliers, but is suitable for anomaly detection tasks. Our method has greater overall detection rates than a baseline model.
在网络安全领域,当检测到的网络数据流量行为与正常数据流量明显不同时,就会触发异常检测。传统方法通常为数据创建或定义正常模式,并将正常模式与检测到的对象进行比较。当出现明显不同的对象时,将其视为异常数据。本文提出了一种新的用于异常检测的神经网络结构,称为度量学习网络,其目的是直接学习异常和正常数据之间的差异,而不是建立正常模式。该网络包括一个自动编码器,用于对异常和正常数据进行编码,以及一个度量学习组件,旨在通过比较方法理解异常和正常数据之间的差异。度量学习组件产生偏差分数以识别检测到的对象。基于TCP (Modbus/Transmission Control Protocol)网络的研究表明,该方法不仅可以学习到正常数据和离群数据之间的区别,而且适用于异常检测任务。我们的方法比基线模型具有更高的总体检出率。
{"title":"Metric Learning with Neural Network for Modbus/TCP Anomaly Detection","authors":"Haicheng Qu, Jianzhong Zhou, Jitao Qin","doi":"10.1145/3411016.3411160","DOIUrl":"https://doi.org/10.1145/3411016.3411160","url":null,"abstract":"In cyber security field, anomaly detection is triggered when detected network data traffic behaves obviously differently from normal data traffic. Traditional approaches typically create or define the normal pattern for the data and compare the normal pattern with the detected object. When a significantly different object appears, it is regarded as abnormal data. This paper proposes a novel neural network structure for anomaly detection, called a metric learning network, which aims to directly learn the differences between abnormal and normal data rather than set up a normal pattern. The network comprises an auto-encoder, which is used to encode the abnormal and normal data, and a metric learning component, which is designed to understand the difference between abnormal and normal data via a comparison approach. A deviation score is produced by the metric learning component to recognize the detected object. Research based on the Modbus/Transmission Control Protocol (TCP) network demonstrates that this approach can not only learn the difference between normal data and outliers, but is suitable for anomaly detection tasks. Our method has greater overall detection rates than a baseline model.","PeriodicalId":251897,"journal":{"name":"Proceedings of the 2nd International Conference on Industrial Control Network And System Engineering Research","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130491836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Relativity-Driven Optimization for Test Schedule of Spaceflight Products at Launch Site 航天产品发射场试验计划的相对论驱动优化
Litian Xiao, Nan Xiao, Mengyuan Li, Shanshan Xie
The test preparation of flight products determines the length of the entire cycle from flight products entering the launch site to launch. The improvement of test efficiency is beneficial to the launch efficiency of the launch site. According to the test scheduling plan of flight products at the launch site, we propose test scheduling model based on related data-driven optimization and superimpose test elements on the test network schedule diagram. By means of the correlation between test item input, excitation and output response, the optimization strategy of test process was proposed to decompose and shorten the critical path on test network schedule. The strategy shortens the test cycle of flight products. Through practice, integration testing and good results have been obtained.
飞行产品的试验准备决定了从飞行产品进入发射场到发射的整个周期的长度。试验效率的提高有利于发射场的发射效率。根据发射场飞行产品的试验调度计划,提出了基于相关数据驱动优化的试验调度模型,并将试验要素叠加到试验网络调度图上。利用测试项目输入、激励和输出响应之间的相关性,提出测试过程优化策略,分解并缩短测试网络调度的关键路径。该策略缩短了飞行产品的测试周期。通过实践,进行了集成测试,取得了良好的效果。
{"title":"Relativity-Driven Optimization for Test Schedule of Spaceflight Products at Launch Site","authors":"Litian Xiao, Nan Xiao, Mengyuan Li, Shanshan Xie","doi":"10.1145/3411016.3411158","DOIUrl":"https://doi.org/10.1145/3411016.3411158","url":null,"abstract":"The test preparation of flight products determines the length of the entire cycle from flight products entering the launch site to launch. The improvement of test efficiency is beneficial to the launch efficiency of the launch site. According to the test scheduling plan of flight products at the launch site, we propose test scheduling model based on related data-driven optimization and superimpose test elements on the test network schedule diagram. By means of the correlation between test item input, excitation and output response, the optimization strategy of test process was proposed to decompose and shorten the critical path on test network schedule. The strategy shortens the test cycle of flight products. Through practice, integration testing and good results have been obtained.","PeriodicalId":251897,"journal":{"name":"Proceedings of the 2nd International Conference on Industrial Control Network And System Engineering Research","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114047917","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Focal Loss Improves the Model Performance on Multi-Label Image Classifications with Imbalanced Data 焦损提高了模型在数据不平衡的多标签图像分类中的性能
Jianxiang Dong
Dealing with imbalanced data has always been a great challenge in statistical learning. In classification problems, instances for different classes are unequal in an imbalanced dataset. Therefore, traditional machine learning classification algorithms are usually sensitive to this imbalance both in the training and inference processes. In this paper, by addressing the class imbalance on the basis of Focal Loss, we introduce an approach to improve the performance of convolutional neural networks (CNNs) on the multi-label image classification with an extremely imbalanced dataset. As focal loss puts more focus on hard and misclassified examples when comparing with classic cross-entropy loss, our results demonstrate that such loss function indeed achieves a significant improvement of CNN models (ResNet-50, ResNet-101, and SE-ResNeXt-101) regarding the mean F2 scores on the test set.
处理不平衡数据一直是统计学习中的一大挑战。在分类问题中,不同类别的实例在不平衡数据集中是不相等的。因此,传统的机器学习分类算法在训练和推理过程中通常对这种不平衡很敏感。本文通过解决基于焦点损失的类不平衡问题,提出了一种改进卷积神经网络(cnn)在极度不平衡数据集下的多标签图像分类性能的方法。与经典交叉熵损失相比,焦点损失更关注硬分类和错误分类的例子,我们的结果表明,这种损失函数确实实现了CNN模型(ResNet-50, ResNet-101和SE-ResNeXt-101)在测试集上的平均F2分数方面的显着改进。
{"title":"Focal Loss Improves the Model Performance on Multi-Label Image Classifications with Imbalanced Data","authors":"Jianxiang Dong","doi":"10.1145/3411016.3411020","DOIUrl":"https://doi.org/10.1145/3411016.3411020","url":null,"abstract":"Dealing with imbalanced data has always been a great challenge in statistical learning. In classification problems, instances for different classes are unequal in an imbalanced dataset. Therefore, traditional machine learning classification algorithms are usually sensitive to this imbalance both in the training and inference processes. In this paper, by addressing the class imbalance on the basis of Focal Loss, we introduce an approach to improve the performance of convolutional neural networks (CNNs) on the multi-label image classification with an extremely imbalanced dataset. As focal loss puts more focus on hard and misclassified examples when comparing with classic cross-entropy loss, our results demonstrate that such loss function indeed achieves a significant improvement of CNN models (ResNet-50, ResNet-101, and SE-ResNeXt-101) regarding the mean F2 scores on the test set.","PeriodicalId":251897,"journal":{"name":"Proceedings of the 2nd International Conference on Industrial Control Network And System Engineering Research","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126868149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A color image edge detection method based on entropy operator 基于熵算子的彩色图像边缘检测方法
Wang Na
On the basis of making full use of the rich color information of color images, an edge detection method based on entropy operator in 1αβ space is proposed. In the color image space of 1αβ with the least correlation, the two-threshold method based on Shiozaki entropy operator is adopted to extract the edge of color image, which can effectively detect the edge of the region with little change in brightness, chroma or the region with dark light, and obtain rich edge information.
在充分利用彩色图像丰富的色彩信息的基础上,提出了一种基于熵算子的1αβ空间边缘检测方法。在相关性最小的1αβ彩色图像空间中,采用基于Shiozaki熵算子的二阈值方法提取彩色图像的边缘,可以有效检测亮度、色度变化较小的区域或光线较暗的区域的边缘,获得丰富的边缘信息。
{"title":"A color image edge detection method based on entropy operator","authors":"Wang Na","doi":"10.1145/3411016.3411022","DOIUrl":"https://doi.org/10.1145/3411016.3411022","url":null,"abstract":"On the basis of making full use of the rich color information of color images, an edge detection method based on entropy operator in 1αβ space is proposed. In the color image space of 1αβ with the least correlation, the two-threshold method based on Shiozaki entropy operator is adopted to extract the edge of color image, which can effectively detect the edge of the region with little change in brightness, chroma or the region with dark light, and obtain rich edge information.","PeriodicalId":251897,"journal":{"name":"Proceedings of the 2nd International Conference on Industrial Control Network And System Engineering Research","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115858899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Convolutional Network for Image Steganography With Redundant Embedding 基于冗余嵌入的图像隐写卷积网络
Naixi Liu, Jingcai Liu, Linming Gong, Xingxing Jia, Daoshun Wang
Image steganography is one of the secure methods of information communication. Based on deep learning, the steganography models have obtained better performance than those based on handcraft features, but they can not ensure absolute correctness when extracting bit message. To improve extracting accuracy, we propose a new redundant embedding method. Also, to improve robustness and security against steganalysis, we introduce generative adversarial training into our model. From the experimental results, our proposed methods reduce the extracting inaccuracy significantly while maintaining the capability of resisting steganalysis attack. What's more, our proposed methods can be easily generalized to cover images with different size and embedding capacity of different bit message length. Therefore, the proposed model can have a wider application in real use.
图像隐写是一种安全的信息通信方法。基于深度学习的隐写模型比基于手工特征的隐写模型获得了更好的性能,但在提取位信息时不能保证绝对的正确性。为了提高提取精度,提出了一种新的冗余嵌入方法。此外,为了提高对隐写分析的鲁棒性和安全性,我们在模型中引入了生成对抗训练。实验结果表明,我们提出的方法在保持抗隐写攻击能力的同时,显著降低了提取的不准确性。此外,我们提出的方法可以很容易地推广到不同大小和不同比特信息长度的嵌入容量的图像。因此,该模型在实际应用中具有更广泛的应用前景。
{"title":"Convolutional Network for Image Steganography With Redundant Embedding","authors":"Naixi Liu, Jingcai Liu, Linming Gong, Xingxing Jia, Daoshun Wang","doi":"10.1145/3411016.3411026","DOIUrl":"https://doi.org/10.1145/3411016.3411026","url":null,"abstract":"Image steganography is one of the secure methods of information communication. Based on deep learning, the steganography models have obtained better performance than those based on handcraft features, but they can not ensure absolute correctness when extracting bit message. To improve extracting accuracy, we propose a new redundant embedding method. Also, to improve robustness and security against steganalysis, we introduce generative adversarial training into our model. From the experimental results, our proposed methods reduce the extracting inaccuracy significantly while maintaining the capability of resisting steganalysis attack. What's more, our proposed methods can be easily generalized to cover images with different size and embedding capacity of different bit message length. Therefore, the proposed model can have a wider application in real use.","PeriodicalId":251897,"journal":{"name":"Proceedings of the 2nd International Conference on Industrial Control Network And System Engineering Research","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127034074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on network test technology of localized operating system 本地化操作系统网络测试技术研究
Yingbei Niu
According to the characteristics of the localized operating system, the network system division is analyzed and the network protocol test method is proposed. Two methods are used to verify its function and performance, i.e. to check the test data of communication transmission rate through the TCP mode and UDP mode in hub and direct connection environment, and to check the test data of communication transmission rate between different system on the same machine. The dynamic test covers throughput test, packet loss rate test and delay test. The experimental results show that these two methods can ensure the correctness of the network test function and performance of the localized operating system, and meet the relevant network speed test requirements.
根据本地化操作系统的特点,分析了网络系统划分,提出了网络协议测试方法。验证其功能和性能的方法有两种,一种是在集线器和直连环境下通过TCP模式和UDP模式进行通信传输速率的测试数据,另一种是在同一台机器上不同系统之间进行通信传输速率的测试数据。动态测试包括吞吐量测试、丢包率测试和时延测试。实验结果表明,这两种方法都能保证本地化操作系统的网络测试功能和性能的正确性,满足相关的网速测试要求。
{"title":"Research on network test technology of localized operating system","authors":"Yingbei Niu","doi":"10.1145/3411016.3411024","DOIUrl":"https://doi.org/10.1145/3411016.3411024","url":null,"abstract":"According to the characteristics of the localized operating system, the network system division is analyzed and the network protocol test method is proposed. Two methods are used to verify its function and performance, i.e. to check the test data of communication transmission rate through the TCP mode and UDP mode in hub and direct connection environment, and to check the test data of communication transmission rate between different system on the same machine. The dynamic test covers throughput test, packet loss rate test and delay test. The experimental results show that these two methods can ensure the correctness of the network test function and performance of the localized operating system, and meet the relevant network speed test requirements.","PeriodicalId":251897,"journal":{"name":"Proceedings of the 2nd International Conference on Industrial Control Network And System Engineering Research","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125691126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Performance Analysis of Container Cluster Networking Alternatives 容器集群网络替代方案的性能分析
Gulsum Atici, Pinar Sarisaray Boluk
The use of containers in the informatics industry is increasing rapidly day by day. Although containers have many advantages, such as flexibility, readiness, easy configurability, scalability and low resource consumption, previous researches showed that there are momentous decrements in network performance in containerized cluster environments. Yielded packet sizes and data transfer methods play important roles in the network performance for the networking solutions used in container clusters. As different applications apply different packet sizes and transfer methods, it is of the essence to find and use the best performing networking solution according to application needs. Hence, it is quite important to identify the most convenient container networking solution, especially in production environments. This research analyzed the throughput and latency at varying message sizes on bulk and HTTP-like data transfer methods for container cluster networking solutions, which are Libnetwork, Flannel, Calico, Weave and Open Virtual Networking for Open vSwitch. Furthermore, it compared the performance of cluster networking solutions with a native host. As a result of the experiments, Open Virtual Networking for Open vSwitch and Calico were found to be the most adequate solutions for production environments with the highest throughput and minimum latency values depending on selected message sizes and transfer methods. In addition, a bare-metal host generally outperforms all the container networking solutions except HTTP-like transfer throughput results at a large message size. Hence, this study also demonstrates the offloading impact in container networking solutions.
容器在信息产业中的应用日益迅速。尽管容器具有许多优点,如灵活性、就绪性、易配置性、可扩展性和低资源消耗,但先前的研究表明,在容器化集群环境中,网络性能会有很大的下降。生成的数据包大小和数据传输方法在容器集群中使用的网络解决方案的网络性能中起着重要作用。由于不同的应用程序采用不同的数据包大小和传输方式,因此根据应用程序的需要找到并使用性能最佳的网络解决方案至关重要。因此,确定最方便的容器网络解决方案非常重要,尤其是在生产环境中。本研究分析了容器集群网络解决方案(Libnetwork, Flannel, Calico, Weave和Open Virtual networking for Open vSwitch)的批量和类http数据传输方法在不同消息大小下的吞吐量和延迟。此外,还比较了集群网络解决方案与本机主机的性能。作为实验的结果,Open vSwitch和Calico的Open Virtual Networking被发现是最适合生产环境的解决方案,具有最高的吞吐量和最小的延迟值,具体取决于所选的消息大小和传输方法。此外,裸机主机通常优于所有容器网络解决方案,除了在大消息大小时类似http的传输吞吐量结果。因此,本研究也证明了卸载对容器网络解决方案的影响。
{"title":"A Performance Analysis of Container Cluster Networking Alternatives","authors":"Gulsum Atici, Pinar Sarisaray Boluk","doi":"10.1145/3411016.3411019","DOIUrl":"https://doi.org/10.1145/3411016.3411019","url":null,"abstract":"The use of containers in the informatics industry is increasing rapidly day by day. Although containers have many advantages, such as flexibility, readiness, easy configurability, scalability and low resource consumption, previous researches showed that there are momentous decrements in network performance in containerized cluster environments. Yielded packet sizes and data transfer methods play important roles in the network performance for the networking solutions used in container clusters. As different applications apply different packet sizes and transfer methods, it is of the essence to find and use the best performing networking solution according to application needs. Hence, it is quite important to identify the most convenient container networking solution, especially in production environments. This research analyzed the throughput and latency at varying message sizes on bulk and HTTP-like data transfer methods for container cluster networking solutions, which are Libnetwork, Flannel, Calico, Weave and Open Virtual Networking for Open vSwitch. Furthermore, it compared the performance of cluster networking solutions with a native host. As a result of the experiments, Open Virtual Networking for Open vSwitch and Calico were found to be the most adequate solutions for production environments with the highest throughput and minimum latency values depending on selected message sizes and transfer methods. In addition, a bare-metal host generally outperforms all the container networking solutions except HTTP-like transfer throughput results at a large message size. Hence, this study also demonstrates the offloading impact in container networking solutions.","PeriodicalId":251897,"journal":{"name":"Proceedings of the 2nd International Conference on Industrial Control Network And System Engineering Research","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122213755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Proceedings of the 2nd International Conference on Industrial Control Network And System Engineering Research
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1